Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION_FEBQUOTE312025PDF.scr.exe

Overview

General Information

Sample name:QUOTATION_FEBQUOTE312025PDF.scr.exe
Analysis ID:1636408
MD5:6126dfbcef916c031c1b9c9906dbfa69
SHA1:3d7cf8fb4c7832bc917d43c9551907b8633da776
SHA256:7bcb379b68f81b941856cd711980a14a8e3ae8954c1328342185d77511617e50
Tags:exeMassLoggerscruser-abuse_ch
Infos:

Detection

MSIL Logger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MSIL Logger
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • QUOTATION_FEBQUOTE312025PDF.scr.exe (PID: 7864 cmdline: "C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe" MD5: 6126DFBCEF916C031C1B9C9906DBFA69)
    • RegAsm.exe (PID: 7564 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1733436944.00000000052F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.1730533843.00000000039DA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
      00000008.00000002.2475864432.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        00000000.00000002.1730533843.00000000038EF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
          00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
              0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.52f0000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.52f0000.6.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  8.2.RegAsm.exe.400000.0.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                    0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-12T18:42:40.734395+010028032742Potentially Bad Traffic192.168.2.449725193.122.6.16880TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeAvira: detected
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeVirustotal: Detection: 26%Perma Link
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeReversingLabs: Detection: 50%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                      Location Tracking

                      barindex
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000037B5000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.0000000003761000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1734111812.0000000005B50000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000037B5000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.0000000003761000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1734111812.0000000005B50000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0531475Bh8_2_05314102
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0655F64Fh8_2_0655EF78
                      Source: global trafficTCP traffic: 192.168.2.4:63283 -> 162.159.36.2:53
                      Source: global trafficTCP traffic: 192.168.2.4:50263 -> 162.159.36.2:53
                      Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                      Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                      Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49725 -> 193.122.6.168:80
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                      Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                      Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeString found in binary or memory: http://www.codeproject.com/Articles/16009/A-Much-Easier-to-Use-ListView
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726

                      System Summary

                      barindex
                      Source: initial sampleStatic PE information: Filename: QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A364D8 NtResumeThread,0_2_05A364D8
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A364D0 NtResumeThread,0_2_05A364D0
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_00B4EC900_2_00B4EC90
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_00B4A7F70_2_00B4A7F7
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_00B4A7F80_2_00B4A7F8
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_00B4B1880_2_00B4B188
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A1F5900_2_05A1F590
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A1F8700_2_05A1F870
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A1E5300_2_05A1E530
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A0003B0_2_05A0003B
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A000400_2_05A00040
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A1E0400_2_05A1E040
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A300400_2_05A30040
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A300070_2_05A30007
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A41E08_2_011A41E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A35288_2_011A3528
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011AD9F68_2_011AD9F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A41D08_2_011A41D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A97598_2_011A9759
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A97688_2_011A9768
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A465B8_2_011A465B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A46688_2_011A4668
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011AD9388_2_011AD938
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011AD9288_2_011AD928
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A3F1B8_2_011A3F1B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A3F288_2_011A3F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0531E2B08_2_0531E2B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_053173508_2_05317350
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0531CFF88_2_0531CFF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_05313E248_2_05313E24
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_053179F88_2_053179F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_053179EA8_2_053179EA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_064734B08_2_064734B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_064742108_2_06474210
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_064767308_2_06476730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647C5308_2_0647C530
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647BA008_2_0647BA00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065257C88_2_065257C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065270608_2_06527060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0652DC508_2_0652DC50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06553F1F8_2_06553F1F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06553F208_2_06553F20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065593908_2_06559390
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0655539D8_2_0655539D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065500408_2_06550040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0655001D8_2_0655001D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065585608_2_06558560
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000037B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.0000000003761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002AD6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000000.1227812114.0000000000102000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYepvtzyf.exe> vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1722959147.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1731834870.0000000004D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEdapqkcvjxv.dll" vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000038EF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1734111812.0000000005B50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeBinary or memory string: OriginalFilenameYepvtzyf.exe> vs QUOTATION_FEBQUOTE312025PDF.scr.exe
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, VisibleSummarizer.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, YbOkxJkkuyrEvGpZRxB.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, v8f3sEAiXMIndiAwxA.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, J6ZmsiiOv9lL9au1RsD.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, J6ZmsiiOv9lL9au1RsD.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@4/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: RegAsm.exe, 00000008.00000002.2478463480.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002CFC000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002D0C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeVirustotal: Detection: 26%
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeReversingLabs: Detection: 50%
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeString found in binary or memory: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><HTML><HEAD></HEAD><BODY><!--StartFragment-->{0}<!--EndFragment--></BODY></HTML>
                      Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe "C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe"
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic file information: File size 2265088 > 1048576
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x227400
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000037B5000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.0000000003761000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1734111812.0000000005B50000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.00000000037B5000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1730533843.0000000003761000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1734111812.0000000005B50000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, J6ZmsiiOv9lL9au1RsD.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, SelectorEvaluator.cs.Net Code: UndoAccessibleSelector System.AppDomain.Load(byte[])
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3765570.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.37b5590.0.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.5b50000.8.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.52f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.52f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1733436944.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION_FEBQUOTE312025PDF.scr.exe PID: 7864, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_00B43220 push eax; retf 0_2_00B4322A
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A06DA4 push ds; ret 0_2_05A06DA7
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A027A6 pushad ; retf 0_2_05A027A8
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A02E17 pushad ; retf 0_2_05A02E19
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A0108D pushad ; retf 0_2_05A0108F
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A070FB push edi; ret 0_2_05A07106
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A038C5 pushad ; retf 0_2_05A038CB
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A048D8 pushad ; retf 0_2_05A048DA
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeCode function: 0_2_05A04BA9 pushad ; retf 0_2_05A04BAB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A83A6 push edi; ret 8_2_011A83A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A778B push eax; iretd 8_2_011A77B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A1674 push esp; ret 8_2_011A1675
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A0C5E push esp; ret 8_2_011A0C5F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A1CCE push esp; ret 8_2_011A1CCF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_011A1F51 push esp; ret 8_2_011A1F52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647CE5C push es; retf 8_2_0647CE98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647872A push es; ret 8_2_0647872C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06471D09 push es; retf 8_2_06471D3C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06470D14 push eax; retf 8_2_06470D16
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06479B30 push es; ret 8_2_06479B50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647B96C push es; retf 8_2_0647B9A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0647B9AD push es; ret 8_2_0647B9B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065210C0 push es; iretd 8_2_065210CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0652BA72 push es; ret 8_2_0652BA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065208D2 push es; ret 8_2_065208C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_065208B0 push es; ret 8_2_065208C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06557E7E push esi; ret 8_2_06557E87
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06557AB6 push es; ret 8_2_06557AB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06550006 push es; iretd 8_2_0655001C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06553CBE push es; retf 8_2_06553CCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06553D9E push es; ret 8_2_06553DA0
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, YbOkxJkkuyrEvGpZRxB.csHigh entropy of concatenated method names: 'mCQ6KMUjYr', 'wtG6kXePJ2', 'r5A6N5xxMK', 'BF66s6iow9', 'dKY6F5m4Gy', 'lpW6HqP0Ep', 'c0nLJsFIhmtKWnrmfRm', 'Tkv7mZFVmkSCgsJwx15', 'jP1kMGgH5w', 'kulkibIKTL'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, v8f3sEAiXMIndiAwxA.csHigh entropy of concatenated method names: 'JQFKlfqBZ4', 'TnHK561v3T', 'aDH01VFTTbKusDw5mZg', 'yqTRUpFZBPoZXe2cJpI', 'a8gKaGXJNL', 'KTPKOsEjXm', 'h0fKLfRjc7', 'SSwK1RC8Ib', 'M5MKveiNN7', 'YsPKVbe9XQ'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, RNPoHHZfZ4GBIKwk9N.csHigh entropy of concatenated method names: 'KEl9Rk5cY', 'u2mLBcpbk', 'Equals', 'GetHashCode', 'Nyd77sDV0', 'ToString', 'cwlwMF2xfjh1CGaq8xv', 'WEd5m72b7sBaBR0VWLy', 'Equals', 'GetHashCode'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, J6ZmsiiOv9lL9au1RsD.csHigh entropy of concatenated method names: 'Wth73nHVMa5sADcZHQ2', 'Lffoa7HmFPDwCygdZQE', 'hrFsMvBK3P', 'vh0ry9Sq2v', 'rleshxDwlj', 'XimsGa4Xgq', 'my4sThPAaP', 'sYPsZnZ7Tw', 'VI0hjnOZOq', 'U67iCPKWWG'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, MozilSpeed.csHigh entropy of concatenated method names: 'CvI6AeNVRf', 'YOh64VemIN', 'mJy6nO9dZv', 'rj66rJW9WZ', 'c386zSxFLG', 'W99Mp3ev6T', 'OdSDLmH2Q5f1Ux9WlY8', 'wbRaBpHFhHe9oYq8IQW', 'oQRMN1w14M', 'mXgMsKlOed'
                      Source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, NuSFFTsuKcAuqQw8oNh.csHigh entropy of concatenated method names: 'PK6sU4blxy', 'suJs1y5bNp', 'arBsviQZ2y', 'u5MsIJfJAG', 'pHusVh6nsh', 'idRsmla7mS', 'TtpsdoJZxv', 'NbZsqACico', 'a0Xsj1M3pC', 'zjnscu5465'
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: QUOTATION_FEBQUOTE312025PDF.scr.exe PID: 7864, type: MEMORYSTR
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory allocated: 2760000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory allocated: 25A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 11A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4C20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599657Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594612Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1588Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8237Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe TID: 7868Thread sleep count: 53 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe TID: 7868Thread sleep time: -52947s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep count: 35 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 424Thread sleep count: 1588 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 424Thread sleep count: 8237 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599766s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599657s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep count: 38 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599532s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599407s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599157s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -599047s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598938s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598813s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598563s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598438s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598328s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598219s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -598094s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597235s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -597110s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596235s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -596110s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595235s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -595110s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594612s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594235s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -594110s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7924Thread sleep time: -593985s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599657Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594612Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593985Jump to behavior
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: jetgS3wHgFSpecified
                      Source: QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: RegAsm.exe, 00000008.00000002.2476677634.0000000001031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0531E2B0 LdrInitializeThunk,8_2_0531E2B0
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 448000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44A000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: AD8008Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeQueries volume information: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1730533843.00000000039DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2475864432.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1730533843.00000000038EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION_FEBQUOTE312025PDF.scr.exe PID: 7864, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7564, type: MEMORYSTR
                      Source: Yara matchFile source: 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7564, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000008.00000002.2478463480.0000000002D50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7564, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_FEBQUOTE312025PDF.scr.exe.3956e98.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1730533843.00000000039DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2475864432.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1730533843.00000000038EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION_FEBQUOTE312025PDF.scr.exe PID: 7864, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7564, type: MEMORYSTR
                      Source: Yara matchFile source: 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7564, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      211
                      Process Injection
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      11
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      31
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      211
                      Process Injection
                      Security Account Manager31
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares1
                      Data from Local System
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture13
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      System Network Configuration Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Software Packing
                      Cached Domain Credentials13
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      QUOTATION_FEBQUOTE312025PDF.scr.exe26%VirustotalBrowse
                      QUOTATION_FEBQUOTE312025PDF.scr.exe50%ReversingLabsByteCode-MSIL.Trojan.CrypterX
                      QUOTATION_FEBQUOTE312025PDF.scr.exe100%AviraTR/Dropper.MSIL.hammw
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      reallyfreegeoip.org
                      104.21.16.1
                      truefalse
                        high
                        checkip.dyndns.com
                        193.122.6.168
                        truefalse
                          high
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            171.39.242.20.in-addr.arpa
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://github.com/mgravell/protobuf-netiQUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/14436606/23354QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.com/mgravell/protobuf-netJQUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/botRegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comdRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/11564914/23354;QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpfalse
                                              high
                                              https://stackoverflow.com/q/2152978/23354QUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpfalse
                                                high
                                                http://reallyfreegeoip.orgdRegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://reallyfreegeoip.orgRegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgdRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/mgravell/protobuf-netQUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1733656276.0000000005370000.00000004.08000000.00040000.00000000.sdmpfalse
                                                          high
                                                          https://reallyfreegeoip.orgRegAsm.exe, 00000008.00000002.2478463480.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.codeproject.com/Articles/16009/A-Much-Easier-to-Use-ListViewQUOTATION_FEBQUOTE312025PDF.scr.exefalse
                                                              high
                                                              http://checkip.dyndns.orgRegAsm.exe, 00000008.00000002.2478463480.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://checkip.dyndns.comRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://checkip.dyndns.org/dRegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQUOTATION_FEBQUOTE312025PDF.scr.exe, 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://reallyfreegeoip.org/xml/RegAsm.exe, 00000008.00000002.2478463480.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        104.21.16.1
                                                                        reallyfreegeoip.orgUnited States
                                                                        13335CLOUDFLARENETUSfalse
                                                                        193.122.6.168
                                                                        checkip.dyndns.comUnited States
                                                                        31898ORACLE-BMC-31898USfalse
                                                                        Joe Sandbox version:42.0.0 Malachite
                                                                        Analysis ID:1636408
                                                                        Start date and time:2025-03-12 18:40:47 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 6m 34s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:12
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:QUOTATION_FEBQUOTE312025PDF.scr.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.evad.winEXE@3/0@4/2
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 92%
                                                                        • Number of executed functions: 119
                                                                        • Number of non-executed functions: 12
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                        • Excluded domains from analysis (whitelisted): a-ring-fallback.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                        TimeTypeDescription
                                                                        13:42:21API Interceptor23x Sleep call for process: QUOTATION_FEBQUOTE312025PDF.scr.exe modified
                                                                        13:42:47API Interceptor20162x Sleep call for process: RegAsm.exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        104.21.16.1J8bamK92a3.exeGet hashmaliciousFormBookBrowse
                                                                        • www.play-vanguard-nirvana.xyz/egs9/?9r=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDKEzYOkwPMwL8bVA==&vZR=H2MpG0p
                                                                        0t7MXNEfCg.exeGet hashmaliciousFormBookBrowse
                                                                        • www.rbopisalive.cyou/2dxw/
                                                                        g1V10ssekg.exeGet hashmaliciousFormBookBrowse
                                                                        • www.sigaque.today/n61y/?UPV=BOlfS7N9ZWkGRIMRgNC6B6+WUTyM673eSjZAzliNIDKZHnAeT7/5dfTbZtimq+dx8K4CQjPcymznAMXPWSrBBYPYz0JSQDMkWzhvpNbFnW2/OcjAWw==&YrV=FlsDgRMx
                                                                        0IrTeguWM7.exeGet hashmaliciousFormBookBrowse
                                                                        • www.tumbetgirislinki.fit/ftbq/
                                                                        Shipping Document.exeGet hashmaliciousFormBookBrowse
                                                                        • www.rbopisalive.cyou/6m32/
                                                                        Payment Record.exeGet hashmaliciousLokibotBrowse
                                                                        • touxzw.ir/sccc/five/fre.php
                                                                        Invoice Remittance ref27022558.exeGet hashmaliciousFormBookBrowse
                                                                        • www.rbopisalive.cyou/a669/
                                                                        ujXpculHYDYhc6i.exeGet hashmaliciousLokibotBrowse
                                                                        • touxzw.ir/sss2/five/fre.php
                                                                        368c6e62-b031-5b65-fd43-e7a610184138.emlGet hashmaliciousHTMLPhisherBrowse
                                                                        • ce60771026585.oakdiiocese.org/p/298?session=770558a25b5d1fcbb8d81f113631d430f5b8d022cdc6d97cf6b16a412a3be9e6
                                                                        http://orico-rapaciid.xqyrr.cn/eorico/login/Get hashmaliciousUnknownBrowse
                                                                        • orico-rapaciid.xqyrr.cn/favicon.ico
                                                                        193.122.6.168Way bill & Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        New Order RFQ- 19A20060.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        INQ_NO_097590_0109_Order.cmdGet hashmaliciousDBatLoader, MSIL Logger, MassLogger RAT, PureLog StealerBrowse
                                                                        • checkip.dyndns.org/
                                                                        SIP_20252701095738583757327401213.bat.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • checkip.dyndns.org/
                                                                        4kobC6KGC3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        p7wgyD3kbI.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        hcy2SdW2z6.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        C7fclY8IiM.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        oybsEA5EhR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        REQ. NO.237.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • checkip.dyndns.org/
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        checkip.dyndns.comPENDING PAYMENT FOR March SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 132.226.247.73
                                                                        Yeni Sat#U0131nalma Sipari#U015fi.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 193.122.130.0
                                                                        MALZEME G_0017 TABANCA SPREY NOZUL.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 193.122.130.0
                                                                        Way bill & Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 193.122.6.168
                                                                        1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • 132.226.8.169
                                                                        file.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 132.226.8.169
                                                                        file.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 193.122.130.0
                                                                        #rfq=O250116 - #U304a#U3088#U3073#U8cfc#U5165#U5951#U7d04- Offer Z01G-00008D SUPPLY - H64PO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • 158.101.44.242
                                                                        PAGOS RETRASADOS.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 193.122.130.0
                                                                        Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 132.226.8.169
                                                                        reallyfreegeoip.orgPENDING PAYMENT FOR March SOA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 104.21.64.1
                                                                        Yeni Sat#U0131nalma Sipari#U015fi.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 104.21.96.1
                                                                        MALZEME G_0017 TABANCA SPREY NOZUL.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 104.21.112.1
                                                                        Way bill & Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 104.21.96.1
                                                                        1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • 104.21.96.1
                                                                        file.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 104.21.48.1
                                                                        file.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 104.21.96.1
                                                                        #rfq=O250116 - #U304a#U3088#U3073#U8cfc#U5165#U5951#U7d04- Offer Z01G-00008D SUPPLY - H64PO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • 104.21.80.1
                                                                        PAGOS RETRASADOS.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 104.21.112.1
                                                                        Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 104.21.16.1
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        ORACLE-BMC-31898USYeni Sat#U0131nalma Sipari#U015fi.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 193.122.130.0
                                                                        MALZEME G_0017 TABANCA SPREY NOZUL.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 193.122.130.0
                                                                        Way bill & Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 193.122.6.168
                                                                        cbr.m68k.elfGet hashmaliciousMiraiBrowse
                                                                        • 144.25.156.103
                                                                        file.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                        • 193.122.130.0
                                                                        http://account.hrblock.comGet hashmaliciousUnknownBrowse
                                                                        • 130.61.120.2
                                                                        #rfq=O250116 - #U304a#U3088#U3073#U8cfc#U5165#U5951#U7d04- Offer Z01G-00008D SUPPLY - H64PO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        • 158.101.44.242
                                                                        PAGOS RETRASADOS.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 193.122.130.0
                                                                        QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                                        • 193.122.130.0
                                                                        niceworkingskillwithbestideasevermade.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                                                        • 158.101.44.242
                                                                        CLOUDFLARENETUSPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                        • 104.21.68.120
                                                                        aXeuKjNXAK.ps1Get hashmaliciousRHADAMANTHYSBrowse
                                                                        • 172.64.41.3
                                                                        Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                        • 104.21.68.120
                                                                        Q6EK7dte4N.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.96.1
                                                                        x1D44JHWDf.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.64.1
                                                                        Dsyhre- approved on Wednesday March 2025.pdfGet hashmaliciousGabagoolBrowse
                                                                        • 172.67.74.152
                                                                        9ua5N7dcBZ.exeGet hashmaliciousAmadey, RHADAMANTHYSBrowse
                                                                        • 172.64.41.3
                                                                        https://tb.boldntfst.shop/Get hashmaliciousUnknownBrowse
                                                                        • 172.67.154.53
                                                                        Venom.6.0.3.exeGet hashmaliciousXWormBrowse
                                                                        • 172.67.19.24
                                                                        https://gamma.app/docs/Acme-Marinas-u6y65o1kwdzhz1k?mode=present#card-8msfzjulvjyffwkGet hashmaliciousHTMLPhisherBrowse
                                                                        • 104.18.11.200
                                                                        No context
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.075941957297543
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        File name:QUOTATION_FEBQUOTE312025PDF.scr.exe
                                                                        File size:2'265'088 bytes
                                                                        MD5:6126dfbcef916c031c1b9c9906dbfa69
                                                                        SHA1:3d7cf8fb4c7832bc917d43c9551907b8633da776
                                                                        SHA256:7bcb379b68f81b941856cd711980a14a8e3ae8954c1328342185d77511617e50
                                                                        SHA512:cab1ba590a95c164bbcbf58344bc56cef50bfae0b30e6f12b67347d53d05e486450bd5b9f6dcc8584c7774e34679a51d7f23895722d4a4cd56c8a3e32b5b8e2f
                                                                        SSDEEP:24576:eXzqApELtMXIcflDsx+8O5mw32Yc4hxpZdawZxY8QOTkEGZvHY6JLab:MOwxp84mwGYXhxpZsk3W3fY6JLa
                                                                        TLSH:8BA53923FE47ABF1C2542777FADB4C0053A4E6817717D65FB9CA636A1843BBA8940207
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...d..g.................t".........n.".. ...."...@.. ........................"...........`................................
                                                                        Icon Hash:0f7968e428693107
                                                                        Entrypoint:0x62926e
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x67D0F964 [Wed Mar 12 03:03:00 2025 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2292200x4b.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x22a0000x177c.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x22c0000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000x2272740x2274009f50087b727225d39d5b08d03db00c0cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x22a0000x177c0x180011ca8fd85b3b7f70077371de07e684adFalse0.37109375data5.247511295178287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x22c0000xc0x200dffc6b9e899b2cc62160d46c25a2fa28False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0x22a1600x368Device independent bitmap graphic, 16 x 32 x 24, image size 7680.48623853211009177
                                                                        RT_ICON0x22a4c80xca8Device independent bitmap graphic, 32 x 64 x 24, image size 30720.3333333333333333
                                                                        RT_GROUP_ICON0x22b1700x22data0.9705882352941176
                                                                        RT_VERSION0x22b1940x3fcdata0.40490196078431373
                                                                        RT_MANIFEST0x22b5900x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain
                                                                        DescriptionData
                                                                        Translation0x0000 0x04b0
                                                                        CommentsAhnLab V3 Lite Main UI Application
                                                                        CompanyNameAhnLab, Inc.
                                                                        FileDescriptionAhnLab V3 Lite Main UI Application
                                                                        FileVersion4.0.0.117
                                                                        InternalNameYepvtzyf.exe
                                                                        LegalCopyright 2018-2019 AhnLab, Inc. All rights reserved.
                                                                        LegalTrademarks
                                                                        OriginalFilenameYepvtzyf.exe
                                                                        ProductNameAhnLab V3 Lite
                                                                        ProductVersion4.0.0.117
                                                                        Assembly Version4.0.0.117
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2025-03-12T18:42:40.734395+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449725193.122.6.16880TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Mar 12, 2025 18:42:39.814795017 CET4972580192.168.2.4193.122.6.168
                                                                        Mar 12, 2025 18:42:39.819498062 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:42:39.819595098 CET4972580192.168.2.4193.122.6.168
                                                                        Mar 12, 2025 18:42:39.820058107 CET4972580192.168.2.4193.122.6.168
                                                                        Mar 12, 2025 18:42:39.824976921 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:42:40.476721048 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:42:40.487901926 CET4972580192.168.2.4193.122.6.168
                                                                        Mar 12, 2025 18:42:40.492635012 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:42:40.679904938 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:42:40.690725088 CET49726443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:40.690762043 CET44349726104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:40.690838099 CET49726443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:40.700511932 CET49726443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:40.700537920 CET44349726104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:40.734395027 CET4972580192.168.2.4193.122.6.168
                                                                        Mar 12, 2025 18:42:48.824048996 CET44349726104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:48.824295044 CET49726443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:48.852075100 CET49726443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:48.852104902 CET44349726104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:48.854197979 CET49728443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:48.854232073 CET44349728104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:48.854321003 CET49728443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:48.854650021 CET49728443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:48.854664087 CET44349728104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:57.009588003 CET44349728104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:42:57.009742022 CET49728443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:57.011223078 CET49728443192.168.2.4104.21.16.1
                                                                        Mar 12, 2025 18:42:57.011260986 CET44349728104.21.16.1192.168.2.4
                                                                        Mar 12, 2025 18:43:22.760066032 CET6328353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:22.764842987 CET5363283162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:22.764929056 CET6328353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:22.770165920 CET5363283162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:23.248095989 CET6328353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:23.254148960 CET5363283162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:23.254256010 CET6328353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:40.492830992 CET5026353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:40.497874975 CET5350263162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:40.497962952 CET5026353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:40.503242016 CET5350263162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:40.967749119 CET5026353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:40.973110914 CET5350263162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:40.973177910 CET5026353192.168.2.4162.159.36.2
                                                                        Mar 12, 2025 18:43:45.680572033 CET8049725193.122.6.168192.168.2.4
                                                                        Mar 12, 2025 18:43:45.680689096 CET4972580192.168.2.4193.122.6.168
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Mar 12, 2025 18:42:39.800205946 CET6072853192.168.2.41.1.1.1
                                                                        Mar 12, 2025 18:42:39.807018995 CET53607281.1.1.1192.168.2.4
                                                                        Mar 12, 2025 18:42:40.682209969 CET5499953192.168.2.41.1.1.1
                                                                        Mar 12, 2025 18:42:40.689610958 CET53549991.1.1.1192.168.2.4
                                                                        Mar 12, 2025 18:43:21.751039028 CET5069353192.168.2.41.1.1.1
                                                                        Mar 12, 2025 18:43:21.758981943 CET53506931.1.1.1192.168.2.4
                                                                        Mar 12, 2025 18:43:22.758725882 CET5362442162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:23.254538059 CET5127553192.168.2.41.1.1.1
                                                                        Mar 12, 2025 18:43:23.275908947 CET53512751.1.1.1192.168.2.4
                                                                        Mar 12, 2025 18:43:40.491722107 CET5364988162.159.36.2192.168.2.4
                                                                        Mar 12, 2025 18:43:40.980830908 CET53582181.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Mar 12, 2025 18:42:39.800205946 CET192.168.2.41.1.1.10xb12dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.682209969 CET192.168.2.41.1.1.10x4aaaStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.751039028 CET192.168.2.41.1.1.10x86b5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:23.254538059 CET192.168.2.41.1.1.10xb597Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:39.807018995 CET1.1.1.1192.168.2.40xb12dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:42:40.689610958 CET1.1.1.1192.168.2.40x4aaaNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:21.758981943 CET1.1.1.1192.168.2.40x86b5No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                        Mar 12, 2025 18:43:23.275908947 CET1.1.1.1192.168.2.40xb597Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                        • checkip.dyndns.org
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449725193.122.6.168807564C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Mar 12, 2025 18:42:39.820058107 CET151OUTGET / HTTP/1.1
                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                        Host: checkip.dyndns.org
                                                                        Connection: Keep-Alive
                                                                        Mar 12, 2025 18:42:40.476721048 CET273INHTTP/1.1 200 OK
                                                                        Date: Wed, 12 Mar 2025 17:42:40 GMT
                                                                        Content-Type: text/html
                                                                        Content-Length: 104
                                                                        Connection: keep-alive
                                                                        Cache-Control: no-cache
                                                                        Pragma: no-cache
                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                        Mar 12, 2025 18:42:40.487901926 CET127OUTGET / HTTP/1.1
                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                        Host: checkip.dyndns.org
                                                                        Mar 12, 2025 18:42:40.679904938 CET273INHTTP/1.1 200 OK
                                                                        Date: Wed, 12 Mar 2025 17:42:40 GMT
                                                                        Content-Type: text/html
                                                                        Content-Length: 104
                                                                        Connection: keep-alive
                                                                        Cache-Control: no-cache
                                                                        Pragma: no-cache
                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:13:41:48
                                                                        Start date:12/03/2025
                                                                        Path:C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\QUOTATION_FEBQUOTE312025PDF.scr.exe"
                                                                        Imagebase:0x100000
                                                                        File size:2'265'088 bytes
                                                                        MD5 hash:6126DFBCEF916C031C1B9C9906DBFA69
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1733436944.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1730533843.00000000039DA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000000.00000002.1730533843.00000000038EF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1723688514.0000000002761000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:13:42:38
                                                                        Start date:12/03/2025
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                        Imagebase:0xc20000
                                                                        File size:65'440 bytes
                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_MSILLogger, Description: Yara detected MSIL Logger, Source: 00000008.00000002.2475864432.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2478463480.0000000002D50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2478463480.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Reset < >