Loading ...

Play interactive tourEdit tour

Analysis Report Quote-TSL-1037174_4810.exe

Overview

General Information

Sample Name:Quote-TSL-1037174_4810.exe
Analysis ID:433217
MD5:deb5412f0b0201d045e2007503bbb283
SHA1:4086c81e9c51db9e242c604bfa99ad217a45986d
SHA256:c770d9d870614a8a39844cd1f564bb823944f8d4d25f7d68f15b1401fb08e4e9
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Creates multiple autostart registry keys
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Quote-TSL-1037174_4810.exe (PID: 7032 cmdline: 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe' MD5: DEB5412F0B0201D045E2007503BBB283)
    • MSBuild.exe (PID: 7088 cmdline: 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
  • amve.exe (PID: 5912 cmdline: 'C:\Users\user\AppData\Roaming\bnqw\amve.exe' MD5: DEB5412F0B0201D045E2007503BBB283)
    • MSBuild.exe (PID: 6372 cmdline: 'C:\Users\user\AppData\Roaming\bnqw\amve.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
  • amve.exe (PID: 6740 cmdline: 'C:\Users\user\AppData\Roaming\bnqw\amve.exe' MD5: DEB5412F0B0201D045E2007503BBB283)
    • MSBuild.exe (PID: 6292 cmdline: 'C:\Users\user\AppData\Roaming\bnqw\amve.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
  • NewApp.exe (PID: 2480 cmdline: 'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 1320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • NewApp.exe (PID: 4088 cmdline: 'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 2864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "accounts@buynsell.com.pkTZaQ}N$m+6$vmail.buynsell.com.pkmaria@tradzilanilaw.co.za"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 21 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.amve.exe.9970000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              3.2.amve.exe.9970000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Quote-TSL-1037174_4810.exe.9b10000.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 13 entries

                      Sigma Overview

                      Networking:

                      barindex
                      Sigma detected: MSBuild connects to smtp portShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 194.28.84.37, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 6292, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49770

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "accounts@buynsell.com.pkTZaQ}N$m+6$vmail.buynsell.com.pkmaria@tradzilanilaw.co.za"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeReversingLabs: Detection: 58%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Quote-TSL-1037174_4810.exeReversingLabs: Detection: 58%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: Quote-TSL-1037174_4810.exeJoe Sandbox ML: detected
                      Source: 1.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 0.2.Quote-TSL-1037174_4810.exe.9950000.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 6.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Quote-TSL-1037174_4810.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: NewApp.exe, NewApp.exe.6.dr
                      Source: Binary string: wntdll.pdbUGP source: Quote-TSL-1037174_4810.exe, 00000000.00000003.640105807.0000000009CE0000.00000004.00000001.sdmp, amve.exe, 00000003.00000003.666268900.00000000099F0000.00000004.00000001.sdmp, amve.exe, 00000005.00000003.679791883.0000000009A00000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: Quote-TSL-1037174_4810.exe, 00000000.00000003.640105807.0000000009CE0000.00000004.00000001.sdmp, amve.exe, 00000003.00000003.666268900.00000000099F0000.00000004.00000001.sdmp, amve.exe, 00000005.00000003.679791883.0000000009A00000.00000004.00000001.sdmp
                      Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.dr
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_0040263E FindFirstFileA,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_0040263E FindFirstFileA,

                      Networking:

                      barindex
                      Source: global trafficTCP traffic: 192.168.2.4:49770 -> 194.28.84.37:587
                      Source: Joe Sandbox ViewIP Address: 194.28.84.37 194.28.84.37
                      Source: Joe Sandbox ViewASN Name: HOSTPRO-ASUA HOSTPRO-ASUA
                      Source: global trafficTCP traffic: 192.168.2.4:49770 -> 194.28.84.37:587
                      Source: unknownDNS traffic detected: queries for: mail.buynsell.com.pk
                      Source: MSBuild.exe, 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://IsXVMb.com
                      Source: MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906386973.0000000003016000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906494496.0000000003081000.00000004.00000001.sdmpString found in binary or memory: http://JMZ6qWBlYHv2.net
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://buynsell.com.pk
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://mail.buynsell.com.pk
                      Source: amve.exe, amve.exe, 00000005.00000000.676202111.0000000000409000.00000008.00020000.sdmp, Quote-TSL-1037174_4810.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: Quote-TSL-1037174_4810.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0E
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: Quote-TSL-1037174_4810.exe, 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, amve.exe, 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, amve.exe, 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASS

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 1.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8BF639BFu002dB050u002d491Au002dB7C3u002d9B4E757F287Eu007d/EE632A4Bu002d7496u002d4EB8u002d973Du002dC6A9FD69F6EE.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 4.2.MSBuild.exe.5c0000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8BF639BFu002dB050u002d491Au002dB7C3u002d9B4E757F287Eu007d/EE632A4Bu002d7496u002d4EB8u002d973Du002dC6A9FD69F6EE.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 6.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8BF639BFu002dB050u002d491Au002dB7C3u002d9B4E757F287Eu007d/EE632A4Bu002d7496u002d4EB8u002d973Du002dC6A9FD69F6EE.csLarge array initialization: .cctor: array initializer size 12026
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00404853
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00406131
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_6F731A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_01104860
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_01104790
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_01104810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0110DA20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_060294F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_06027538
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_06026920
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_06026C68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_02374860
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_02374790
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_00404853
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_00406131
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_01194860
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_01194852
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0119DA2B
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 13_2_008B51F9
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 13_2_008B2370
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 13_2_008B1A2F
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 17_2_03032370
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 17_2_030351F9
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeCode function: 17_2_03031A2F
                      Source: Quote-TSL-1037174_4810.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: amve.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: NewApp.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: NewApp.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: NewApp.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Quote-TSL-1037174_4810.exe, 00000000.00000003.643711973.0000000009E3F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Quote-TSL-1037174_4810.exe
                      Source: Quote-TSL-1037174_4810.exe, 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCXJCmeIpHLhzNZNIEmFUISrE.exe4 vs Quote-TSL-1037174_4810.exe
                      Source: Quote-TSL-1037174_4810.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: 1.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.2.MSBuild.exe.5c0000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.2.MSBuild.exe.5c0000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 6.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 6.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: NewApp.exe.6.dr, Microsoft.Build/Shared/TaskLoader.csTask registration methods: 'CreateTask'
                      Source: NewApp.exe.6.dr, Microsoft.Build/CommandLine/OutOfProcTaskHostNode.csTask registration methods: 'RegisterTaskObject', 'UnregisterPacketHandler', 'RegisterPacketHandler', 'UnregisterTaskObject', 'GetRegisteredTaskObject'
                      Source: NewApp.exe.6.dr, Microsoft.Build/BackEnd/TaskParameter.csTask registration methods: 'CreateNewTaskItemFrom'
                      Source: NewApp.exe.6.dr, Microsoft.Build/Shared/RegisteredTaskObjectCacheBase.csTask registration methods: '.cctor', 'GetLazyCollectionForLifetime', 'RegisterTaskObject', 'DisposeObjects', 'IsCollectionEmptyOrUncreated', '.ctor', 'UnregisterTaskObject', 'DisposeCacheObjects', 'GetRegisteredTaskObject', 'GetCollectionForLifetime'
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
                      Source: NewApp.exe.6.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: NewApp.exe.6.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: NewApp.exe.6.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                      Source: NewApp.exe.6.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
                      Source: NewApp.exe.6.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
                      Source: NewApp.exe, 0000000D.00000002.761031096.0000000002401000.00000004.00000001.sdmp, NewApp.exe, 00000011.00000002.779843554.0000000003121000.00000004.00000001.sdmpBinary or memory string: l+C:\Users\user\AppData\Roaming\NewApp\*.sln
                      Source: NewApp.exe, 00000011.00000002.779129505.0000000001373000.00000004.00000020.sdmpBinary or memory string: \??\C:\Users\user\AppData\Roaming\NewApp\<.sln4FF
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
                      Source: NewApp.exe, NewApp.exe.6.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
                      Source: NewApp.exe, 0000000D.00000002.761031096.0000000002401000.00000004.00000001.sdmp, NewApp.exe, 00000011.00000002.779843554.0000000003121000.00000004.00000001.sdmpBinary or memory string: *.slnP#"l
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD
                      Source: NewApp.exe, NewApp.exe.6.drBinary or memory string: *.sln
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: MSBuild MyApp.csproj /t:Clean
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: /ignoreprojectextensions:.sln
                      Source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.drBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
                      Source: NewApp.exe, 0000000D.00000002.760918773.0000000000945000.00000004.00000020.sdmpBinary or memory string: \??\C:\Users\user\AppData\Roaming\NewApp\<.sln
                      Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@13/18@2/1
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile created: C:\Users\user\AppData\Roaming\bnqwJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1320:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2864:120:WilError_01
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile created: C:\Users\user\AppData\Local\Temp\nsk5B46.tmpJump to behavior
                      Source: Quote-TSL-1037174_4810.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Quote-TSL-1037174_4810.exeReversingLabs: Detection: 58%
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile read: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\bnqw\amve.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\bnqw\amve.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe 'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe'
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe 'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe'
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: NewApp.exe, NewApp.exe.6.dr
                      Source: Binary string: wntdll.pdbUGP source: Quote-TSL-1037174_4810.exe, 00000000.00000003.640105807.0000000009CE0000.00000004.00000001.sdmp, amve.exe, 00000003.00000003.666268900.00000000099F0000.00000004.00000001.sdmp, amve.exe, 00000005.00000003.679791883.0000000009A00000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: Quote-TSL-1037174_4810.exe, 00000000.00000003.640105807.0000000009CE0000.00000004.00000001.sdmp, amve.exe, 00000003.00000003.666268900.00000000099F0000.00000004.00000001.sdmp, amve.exe, 00000005.00000003.679791883.0000000009A00000.00000004.00000001.sdmp
                      Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: MSBuild.exe, 00000006.00000003.730833221.0000000005D2E000.00000004.00000001.sdmp, NewApp.exe, 0000000D.00000002.760221121.0000000000122000.00000002.00020000.sdmp, NewApp.exe, 00000011.00000000.775234682.0000000000CD2000.00000002.00020000.sdmp, NewApp.exe.6.dr
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_6F732F60 push eax; ret
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019D474 pushad ; ret
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019CAB2 pushad ; retf
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019B9DA pushad ; ret
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019B8D2 pushad ; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0119B191 push ecx; retf 0002h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0119BF1F pushfd ; retf 0002h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile created: C:\Users\user\AppData\Roaming\bnqw\amve.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeFile created: C:\Users\user\AppData\Local\Temp\nstA2D1.tmp\System.dllJump to dropped file
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeFile created: C:\Users\user\AppData\Local\Temp\nsk5B48.tmp\System.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeFile created: C:\Users\user\AppData\Local\Temp\nsg8314.tmp\System.dllJump to dropped file

                      Boot Survival:

                      barindex
                      Creates multiple autostart registry keysShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NewAppJump to behavior
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run xmalmtehdauowsJump to behavior
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run xmalmtehdauowsJump to behavior
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run xmalmtehdauowsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NewAppJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NewAppJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1160
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3929
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1757
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 8093
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5928Thread sleep time: -12912720851596678s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5572Thread sleep count: 1160 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5572Thread sleep count: 3929 > 30
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exe TID: 6368Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exe TID: 6724Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6912Thread sleep time: -14757395258967632s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7016Thread sleep count: 1757 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7016Thread sleep count: 8093 > 30
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe TID: 5844Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe TID: 6584Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_0040263E FindFirstFileA,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 5_2_0040263E FindFirstFileA,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeThread delayed: delay time: 30000
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeThread delayed: delay time: 30000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeThread delayed: delay time: 922337203685477
                      Source: MSBuild.exe, 00000006.00000003.902134764.0000000005D0F000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                      Source: MSBuild.exe, 00000001.00000002.675759707.0000000005DA0000.00000002.00000001.sdmp, MSBuild.exe, 00000006.00000002.908142775.0000000005DE0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: MSBuild.exe, 00000001.00000002.675759707.0000000005DA0000.00000002.00000001.sdmp, MSBuild.exe, 00000006.00000002.908142775.0000000005DE0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: MSBuild.exe, 00000001.00000002.675759707.0000000005DA0000.00000002.00000001.sdmp, MSBuild.exe, 00000006.00000002.908142775.0000000005DE0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: MSBuild.exe, 00000001.00000002.675759707.0000000005DA0000.00000002.00000001.sdmp, MSBuild.exe, 00000006.00000002.908142775.0000000005DE0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019F64F mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019F68C mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeCode function: 3_2_0019F6EF mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      .NET source code references suspicious native API functionsShow sources
                      Source: 1.2.MSBuild.exe.400000.0.unpack, A/b2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                      Source: 4.2.MSBuild.exe.5c0000.0.unpack, A/b2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                      Source: NewApp.exe.6.dr, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Source: 6.2.MSBuild.exe.400000.0.unpack, A/b2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                      Source: 13.2.NewApp.exe.120000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Source: 13.0.NewApp.exe.120000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: A95008
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 280008
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 805008
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: C:\Users\user\AppData\Roaming\bnqw\amve.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                      Source: MSBuild.exe, 00000006.00000002.905776783.0000000001570000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: MSBuild.exe, 00000006.00000002.905776783.0000000001570000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000006.00000002.905776783.0000000001570000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000006.00000002.905776783.0000000001570000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Users\user\AppData\Roaming\NewApp\NewApp.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NewApp\NewApp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_060258F4 GetUserNameW,
                      Source: C:\Users\user\Desktop\Quote-TSL-1037174_4810.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MSBuild.exe.5c0000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quote-TSL-1037174_4810.exe PID: 7032, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: amve.exe PID: 5912, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: amve.exe PID: 6740, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6372, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7088, type: MEMORY
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MSBuild.exe.5c0000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6372, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7088, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MSBuild.exe.5c0000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quote-TSL-1037174_4810.exe PID: 7032, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: amve.exe PID: 5912, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: amve.exe PID: 6740, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6372, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7088, type: MEMORY
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote-TSL-1037174_4810.exe.9b10000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.amve.exe.9830000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.amve.exe.9970000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.MSBuild.exe.5c0000.0.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection212File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsNative API11Registry Run Keys / Startup Folder11Scheduled Task/Job1Disable or Modify Tools1Input Capture11File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsScheduled Task/Job1Logon Script (Windows)Registry Run Keys / Startup Folder11Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery116SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSQuery Registry1Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSecurity Software Discovery221SSHClipboard Data2Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion141DCSyncVirtualization/Sandbox Evasion141Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 433217 Sample: Quote-TSL-1037174_4810.exe Startdate: 11/06/2021 Architecture: WINDOWS Score: 100 45 Found malware configuration 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected AgentTesla 2->49 51 5 other signatures 2->51 6 amve.exe 18 2->6         started        10 Quote-TSL-1037174_4810.exe 1 22 2->10         started        12 amve.exe 18 2->12         started        14 2 other processes 2->14 process3 file4 33 C:\Users\user\AppData\Local\...\System.dll, PE32 6->33 dropped 65 Writes to foreign memory regions 6->65 67 Maps a DLL or memory area into another process 6->67 16 MSBuild.exe 2 4 6->16         started        35 C:\Users\user\AppData\Roaming\bnqw\amve.exe, PE32 10->35 dropped 37 C:\Users\user\AppData\Local\...\System.dll, PE32 10->37 dropped 69 Creates multiple autostart registry keys 10->69 21 MSBuild.exe 2 10->21         started        39 C:\Users\user\AppData\Local\...\System.dll, PE32 12->39 dropped 71 Multi AV Scanner detection for dropped file 12->71 73 Machine Learning detection for dropped file 12->73 23 MSBuild.exe 2 12->23         started        25 conhost.exe 14->25         started        27 conhost.exe 14->27         started        signatures5 process6 dnsIp7 41 buynsell.com.pk 194.28.84.37, 49770, 587 HOSTPRO-ASUA Ukraine 16->41 43 mail.buynsell.com.pk 16->43 29 C:\Users\user\AppData\Roaming\...29ewApp.exe, PE32 16->29 dropped 31 C:\Windows\System32\drivers\etc\hosts, ASCII 16->31 dropped 53 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->53 55 Tries to steal Mail credentials (via file access) 16->55 57 Creates multiple autostart registry keys 16->57 63 5 other signatures 16->63 59 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 21->59 61 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 21->61 file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Quote-TSL-1037174_4810.exe14%MetadefenderBrowse
                      Quote-TSL-1037174_4810.exe59%ReversingLabsWin32.Backdoor.Androm
                      Quote-TSL-1037174_4810.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\bnqw\amve.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\nsg8314.tmp\System.dll0%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\nsg8314.tmp\System.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\nsk5B48.tmp\System.dll0%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\nsk5B48.tmp\System.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\nstA2D1.tmp\System.dll0%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\nstA2D1.tmp\System.dll0%ReversingLabs
                      C:\Users\user\AppData\Roaming\NewApp\NewApp.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\NewApp\NewApp.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\bnqw\amve.exe14%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\bnqw\amve.exe59%ReversingLabsWin32.Backdoor.Androm

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.amve.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      1.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      0.2.Quote-TSL-1037174_4810.exe.9950000.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      3.0.amve.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      3.2.amve.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      0.0.Quote-TSL-1037174_4810.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      6.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      5.0.amve.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      4.2.MSBuild.exe.5c0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                      0.2.Quote-TSL-1037174_4810.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://mail.buynsell.com.pk0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://IsXVMb.com0%Avira URL Cloudsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://JMZ6qWBlYHv2.net0%Avira URL Cloudsafe
                      http://buynsell.com.pk0%Avira URL Cloudsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                      http://r3.i.lencr.org/0E0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      buynsell.com.pk
                      194.28.84.37
                      truetrue
                        unknown
                        mail.buynsell.com.pk
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://mail.buynsell.com.pkMSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://DynDns.comDynDNSMSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://IsXVMb.comMSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nsis.sf.net/NSIS_Erroramve.exe, amve.exe, 00000005.00000000.676202111.0000000000409000.00000008.00020000.sdmp, Quote-TSL-1037174_4810.exefalse
                            high
                            http://cps.letsencrypt.org0MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://x1.c.lencr.org/0MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://x1.i.lencr.org/0MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://r3.o.lencr.org0MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://nsis.sf.net/NSIS_ErrorErrorQuote-TSL-1037174_4810.exefalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipQuote-TSL-1037174_4810.exe, 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, amve.exe, 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, MSBuild.exe, 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, amve.exe, 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://JMZ6qWBlYHv2.netMSBuild.exe, 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906386973.0000000003016000.00000004.00000001.sdmp, MSBuild.exe, 00000006.00000002.906494496.0000000003081000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://buynsell.com.pkMSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cps.root-x1.letsencrypt.org0MSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://r3.i.lencr.org/0EMSBuild.exe, 00000006.00000002.906442318.0000000003056000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              194.28.84.37
                              buynsell.com.pkUkraine
                              196645HOSTPRO-ASUAtrue

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:433217
                              Start date:11.06.2021
                              Start time:13:18:18
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 10m 52s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Quote-TSL-1037174_4810.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:22
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@13/18@2/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 33.9% (good quality ratio 32.8%)
                              • Quality average: 81.5%
                              • Quality standard deviation: 27%
                              HCA Information:
                              • Successful, ratio: 90%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.64.90.137, 52.255.188.83, 20.82.209.183, 20.54.104.15, 20.54.26.129, 93.184.221.240, 92.122.213.247, 92.122.213.194
                              • Excluded domains from analysis (whitelisted): a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/433217/sample/Quote-TSL-1037174_4810.exe

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              13:19:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run xmalmtehdauows C:\Users\user\AppData\Roaming\bnqw\amve.exe
                              13:19:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run xmalmtehdauows C:\Users\user\AppData\Roaming\bnqw\amve.exe
                              13:19:12API Interceptor2x Sleep call for process: amve.exe modified
                              13:19:14API Interceptor658x Sleep call for process: MSBuild.exe modified
                              13:19:49AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NewApp C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                              13:19:57AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NewApp C:\Users\user\AppData\Roaming\NewApp\NewApp.exe

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              194.28.84.37DENSCO QUOTE.exeGet hashmaliciousBrowse
                                MESCO TQZ24 QUOTE.exeGet hashmaliciousBrowse
                                  TQZ23 DESCO MC.exeGet hashmaliciousBrowse
                                    TQZ23 DESCO MC.exeGet hashmaliciousBrowse
                                      DENSCO QUOTE.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        HOSTPRO-ASUADENSCO QUOTE.exeGet hashmaliciousBrowse
                                        • 194.28.84.37
                                        MESCO TQZ24 QUOTE.exeGet hashmaliciousBrowse
                                        • 194.28.84.37
                                        TQZ23 DESCO MC.exeGet hashmaliciousBrowse
                                        • 194.28.84.37
                                        TQZ23 DESCO MC.exeGet hashmaliciousBrowse
                                        • 194.28.84.37
                                        DENSCO QUOTE.exeGet hashmaliciousBrowse
                                        • 194.28.84.37
                                        4Vy2EGhzNF.exeGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        2020tb3005.doc__.rtfGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        $RAULIU9.exeGet hashmaliciousBrowse
                                        • 91.239.233.22
                                        OUTSTANDING_INV_Statement_937931.xlsGet hashmaliciousBrowse
                                        • 185.67.1.94
                                        866-0001E ORDER AND SHIP.docGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        866-0001E ORDER AND SHIP.docGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        new order list.docGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        nX5xMoS3Pn.exeGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        tryb.docGet hashmaliciousBrowse
                                        • 193.169.188.252
                                        Order Specification.exeGet hashmaliciousBrowse
                                        • 185.156.42.252
                                        rib.exeGet hashmaliciousBrowse
                                        • 91.239.233.22
                                        https://ngor.zlen.com.ua/Restore/Click here to restore message automatically.htmlGet hashmaliciousBrowse
                                        • 91.239.235.5
                                        ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.exeGet hashmaliciousBrowse
                                        • 91.239.235.6
                                        DHL_Receipt_pdf.exeGet hashmaliciousBrowse
                                        • 91.239.235.6
                                        ETD 15-09-2020 (MV.HYUNDAI SUPREME V. 102N_PDF.gz.exeGet hashmaliciousBrowse
                                        • 91.239.235.6

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Users\user\AppData\Local\Temp\nsg8314.tmp\System.dllSX365783909782021.exeGet hashmaliciousBrowse
                                          moq fob order.exeGet hashmaliciousBrowse
                                            0900000000000090000.exeGet hashmaliciousBrowse
                                              444890321.exeGet hashmaliciousBrowse
                                                Packing-List_00930039.exeGet hashmaliciousBrowse
                                                  2435.exeGet hashmaliciousBrowse
                                                    INVOICE.exeGet hashmaliciousBrowse
                                                      Shipment Invoice & Consignment Notification.exeGet hashmaliciousBrowse
                                                        KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                          5t2CmTUhKc.exeGet hashmaliciousBrowse
                                                            8qdfmqz1PN.exeGet hashmaliciousBrowse
                                                              New Order PO2193570O1.docGet hashmaliciousBrowse
                                                                L2.xlsxGet hashmaliciousBrowse
                                                                  Agency Appointment VSL Tbn-Port-Appointment Letter- 2100133.xlsxGet hashmaliciousBrowse
                                                                    New Order PO2193570O1.pdf.exeGet hashmaliciousBrowse
                                                                      2320900000000.exeGet hashmaliciousBrowse
                                                                        CshpH9OSkc.exeGet hashmaliciousBrowse
                                                                          5SXTKXCnqS.exeGet hashmaliciousBrowse
                                                                            i6xFULh8J5.exeGet hashmaliciousBrowse
                                                                              AWB00028487364 -000487449287.docGet hashmaliciousBrowse

                                                                                Created / dropped Files

                                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NewApp.exe.log
                                                                                Process:C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):841
                                                                                Entropy (8bit):5.356220854328477
                                                                                Encrypted:false
                                                                                SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoIvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHwvEHxDqHj
                                                                                MD5:486580834B084C92AE1F3866166C9C34
                                                                                SHA1:C8EB7E1CEF55A6C9EB931487E9AA4A2098AACEDF
                                                                                SHA-256:65C5B1213E371D449E2A239557A5F250FEA1D3473A1B5C4C5FF7492085F663FB
                                                                                SHA-512:2C54B638A52AA87F47CAB50859EFF98F07DA02993A596686B5617BA99E73ABFCD104F0F33209E24AFB32E66B4B8A225D4DB2CC79631540C21E7E8C4573DFD457
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                C:\Users\user\AppData\Local\Temp\5pa4r9ixzaf
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):222208
                                                                                Entropy (8bit):7.999115710953568
                                                                                Encrypted:true
                                                                                SSDEEP:3072:vaBXEtCG5OYajI1w+Z/rT/uh0uZn1k79bG3E6I4Wwu31L676SM98/1ORmcILLQE7:vsmVGCz9uZn6Z6I4YY8mrPLlQGz
                                                                                MD5:C64EDB818138FCBAD02DA4F40AFB504E
                                                                                SHA1:E312998ABA653E46AA64AD17EC06B23C123C363A
                                                                                SHA-256:10F9B7D302BECDA98408F7A361A7F8DE8ECF2149876D7B2D14C08FD62B7FADB5
                                                                                SHA-512:F49E83E1DA717D275C85455C797579560F33D1570410BDBD418866F5F6FA8C9C82A6309FE8E06789ABB50F837E5DD4E013205A0FDFA49C57066CE043A8CF0B39
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: .r......F...<.&.tt.D.D1=.9.....gL.4......@6..@.B.M..U2=...I....Zh.a..;p..?...T=0./J..B.o..W2...T.............._j../7..y...o..s.`....V.pnd...C|....dd......+0..T.....x...'......G*.V+.w.`.......,5.G}#.."..I..M.".X)..e...Z.l...m.c....O@.d@........z".|.Kw>....qb??...Qg.D...3../..Abj.@..7p...6_.....|.{..R./...z....G.#.k.O..f.G.L.P.g.n.....9T1.w.kKFM.f....QWI..vfG...d..c......y...tS..R53=.X..h....$f.....>.p....c.C.d.yx~.q...J..U.`...H[..UU(..r]...u...c.kG.+C.TTq."...._.<.ZD:..Xl.f%.>.b.r..P..4.... .{.b.>.../.....0..t-....$...E.'$^...T"B}<..c...52.%...M.3O..r......q.....Q..c..<..M..C..OH.....g....;Q.Dd.]}...+d(.Z.L..k..4<.|.52.F*.n'\..`}.O..6.....:$..@dG..>..g.4..Q... .....K3b\..P...0.c.u;u\'D..Y|.U.l"..Z..S.@.,.Xp...SCp{......J..SFz..Tp..<..O.".4.R..If....b'%S.+...I..n.C..$...q..CZ7....Lb%.+.`M....3\.....[..rGv..n...V.an...h[..U.%.a<.TZ.C..xd..e(......;....C..%*...df7.P...B. j...MB..%}...kZ....V....F,.TF..Sy.7l......x..KD..GX.yL.$
                                                                                C:\Users\user\AppData\Local\Temp\fygibjohzelpmv
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):62417
                                                                                Entropy (8bit):4.988447505730978
                                                                                Encrypted:false
                                                                                SSDEEP:1536:INzvOIagVy6DOiz8TlJbvuPt0P63/dXT5KJC2GaNjpmSRGT:INzv3zRDiJCWCvJuC7KjU
                                                                                MD5:D966D7333A785DDFF7B56A403AB8388B
                                                                                SHA1:130361814DC909C9036E9554B90381265EF37CA7
                                                                                SHA-256:32CD0E78D96E6CBF2962685077C0287F5301B5BD788F2F4F4ADAFFF0A05B757E
                                                                                SHA-512:B4369E11DC82B7694A7C3941492145EDDA05CCBB52E766D1B0D2FB66BA46C76FACAAEDB4E15121592C8BC51068F79067D34E53073C044DCEC7A006461FD1037F
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: U...".........................................q.....;...........y.......................q.....;...............................................3.....a.....(. .....!....."...s.#...$.$...n.%...5.&.....'.....(.....).....*.....+.....,.....-...$.....n./...5.0.....1.....2.....3.....4.....5.....6...h.7...$.8...n.9...5.:.....;.....<.....=.....>.....?.....@...'.A...$.B...n.C...5.D.....E.....F.....G.....H.....I.....J.....K...$.L...n.M...5.N.....O...P.P.....Q.....R.....S.....T.....U...$.V...n.W...5.X.....Y.....Z.....[.....\.....].....^....._...$.`...n.a...5.b.....c...T.d.....e.....f.....g.....h.....i...$.j...n.k...5.l.....m...R.n.....o.....p.....q.....r...G.s...$.t...n.u...5.v.....w...X.x.....y.....z.....{.....|...C.}...$.~...n.....5...........V.............................h.....$.....n.....5...........\.............................I.....$.....n.....5......
                                                                                C:\Users\user\AppData\Local\Temp\nsg8313.tmp
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):317921
                                                                                Entropy (8bit):7.545162398623952
                                                                                Encrypted:false
                                                                                SSDEEP:6144:UXAsmVGCz9uZn6Z6I4YY8mrPLlQGcNzvthxuYKbt:XsGGyoJ6kf8meGcNzvtnuYKp
                                                                                MD5:EBCC27E483829E2E2E519538BDF71B7E
                                                                                SHA1:81FDE871249D5723415F6A5A0B1F7E83788A70E6
                                                                                SHA-256:86D71D31A0037F33C03921ADAA1D9ABC3E849E8BB6DD935B783AE5DED46E4EE4
                                                                                SHA-512:51339B61CBA1CE0B0F63FEE6C2AE6EFDFE88FBDEB08898F6816115C7E40B174BBCEEE4BF86C8CDED945EA2BE3A29C1D3AA750721D0ACCD643165C6CC25E78332
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: .T......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................v.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsg8314.tmp\System.dll
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: SX365783909782021.exe, Detection: malicious, Browse
                                                                                • Filename: moq fob order.exe, Detection: malicious, Browse
                                                                                • Filename: 0900000000000090000.exe, Detection: malicious, Browse
                                                                                • Filename: 444890321.exe, Detection: malicious, Browse
                                                                                • Filename: Packing-List_00930039.exe, Detection: malicious, Browse
                                                                                • Filename: 2435.exe, Detection: malicious, Browse
                                                                                • Filename: INVOICE.exe, Detection: malicious, Browse
                                                                                • Filename: Shipment Invoice & Consignment Notification.exe, Detection: malicious, Browse
                                                                                • Filename: KY4cmAI0jU.exe, Detection: malicious, Browse
                                                                                • Filename: 5t2CmTUhKc.exe, Detection: malicious, Browse
                                                                                • Filename: 8qdfmqz1PN.exe, Detection: malicious, Browse
                                                                                • Filename: New Order PO2193570O1.doc, Detection: malicious, Browse
                                                                                • Filename: L2.xlsx, Detection: malicious, Browse
                                                                                • Filename: Agency Appointment VSL Tbn-Port-Appointment Letter- 2100133.xlsx, Detection: malicious, Browse
                                                                                • Filename: New Order PO2193570O1.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 2320900000000.exe, Detection: malicious, Browse
                                                                                • Filename: CshpH9OSkc.exe, Detection: malicious, Browse
                                                                                • Filename: 5SXTKXCnqS.exe, Detection: malicious, Browse
                                                                                • Filename: i6xFULh8J5.exe, Detection: malicious, Browse
                                                                                • Filename: AWB00028487364 -000487449287.doc, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsk5B47.tmp
                                                                                Process:C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):317921
                                                                                Entropy (8bit):7.545162398623952
                                                                                Encrypted:false
                                                                                SSDEEP:6144:UXAsmVGCz9uZn6Z6I4YY8mrPLlQGcNzvthxuYKbt:XsGGyoJ6kf8meGcNzvtnuYKp
                                                                                MD5:EBCC27E483829E2E2E519538BDF71B7E
                                                                                SHA1:81FDE871249D5723415F6A5A0B1F7E83788A70E6
                                                                                SHA-256:86D71D31A0037F33C03921ADAA1D9ABC3E849E8BB6DD935B783AE5DED46E4EE4
                                                                                SHA-512:51339B61CBA1CE0B0F63FEE6C2AE6EFDFE88FBDEB08898F6816115C7E40B174BBCEEE4BF86C8CDED945EA2BE3A29C1D3AA750721D0ACCD643165C6CC25E78332
                                                                                Malicious:false
                                                                                Preview: .T......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................v.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsk5B48.tmp\System.dll
                                                                                Process:C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nstA2D0.tmp
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):317921
                                                                                Entropy (8bit):7.545162398623952
                                                                                Encrypted:false
                                                                                SSDEEP:6144:UXAsmVGCz9uZn6Z6I4YY8mrPLlQGcNzvthxuYKbt:XsGGyoJ6kf8meGcNzvtnuYKp
                                                                                MD5:EBCC27E483829E2E2E519538BDF71B7E
                                                                                SHA1:81FDE871249D5723415F6A5A0B1F7E83788A70E6
                                                                                SHA-256:86D71D31A0037F33C03921ADAA1D9ABC3E849E8BB6DD935B783AE5DED46E4EE4
                                                                                SHA-512:51339B61CBA1CE0B0F63FEE6C2AE6EFDFE88FBDEB08898F6816115C7E40B174BBCEEE4BF86C8CDED945EA2BE3A29C1D3AA750721D0ACCD643165C6CC25E78332
                                                                                Malicious:false
                                                                                Preview: .T......,.......................T=.......S.......S..........................................................................................................................................................................................................................................J...................j...............................................................................................................................v.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nstA2D1.tmp\System.dll
                                                                                Process:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):261728
                                                                                Entropy (8bit):6.1750840449797675
                                                                                Encrypted:false
                                                                                SSDEEP:3072:Mao0QHGUQWWimj9q/NLpj/WWqvAw2XpFU4rwOe4ubZSif02RFi/x2uv9FeP:boZTTWxxqVpqWVRXfr802biprVu
                                                                                MD5:D621FD77BD585874F9686D3A76462EF1
                                                                                SHA1:ABCAE05EE61EE6292003AABD8C80583FA49EDDA2
                                                                                SHA-256:2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
                                                                                SHA-512:2D85A81D708ECC8AF9A1273143C94DA84E632F1E595E22F54B867225105A1D0A44F918F0FAE6F1EB15ECF69D75B6F4616699776A16A2AA8B5282100FD15CA74C
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z.........."...0..|...B......n.... ........@.. ....................................`.....................................O........>..............`>.......................................................... ............... ..H............text....z... ...|.................. ..`.rsrc....>.......@...~..............@..@.reloc..............................@..B................P.......H.......8)...................|.........................................*.{.......*v.(=....r...p({...-..+..}....*....0..%........(....-..*....(z.....&..}.........*.*....................0..5........(....-..*.-.r+..ps>...z.....i(z.....&..}.........*.*............%......>....(?...(....*N..(@....oA...(....*:...(B...(....*:...(C...(....**....(....*....0..G........(....,..*..(....-...}.....*.r...p(x...&.(v.....}......&..}.........*.*..........7.......0..f........-.r7..ps>...z .....
                                                                                C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                Process:C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                Category:dropped
                                                                                Size (bytes):448961
                                                                                Entropy (8bit):6.069011681162613
                                                                                Encrypted:false
                                                                                SSDEEP:6144:usUlNPJU0e7dkV3ZLFJVsA2mQ7fGUgYCrQOd:sPJU1763Z7VPw7+Ugfxd
                                                                                MD5:DEB5412F0B0201D045E2007503BBB283
                                                                                SHA1:4086C81E9C51DB9E242C604BFA99AD217A45986D
                                                                                SHA-256:C770D9D870614A8A39844CD1F564BB823944F8D4D25F7D68F15B1401FB08E4E9
                                                                                SHA-512:9310A18A3602D175DD5235AC464CED734AEB1BC5542BC94B45D1BE1B3D8580FB9ACC8FD3834D27025983B87A54DDAACBED9C923E2A79205BFE0CE0AA09E2CF78
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: Metadefender, Detection: 14%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 59%
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................\..........<2.......p....@..........................P...............................................s..........p............................................................................p...............................text...ZZ.......\.................. ..`.rdata.......p.......`..............@..@.data................r..............@....ndata.......@...........................rsrc...p............v..............@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Windows\System32\drivers\etc\hosts
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):11
                                                                                Entropy (8bit):2.663532754804255
                                                                                Encrypted:false
                                                                                SSDEEP:3:iLE:iLE
                                                                                MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                                SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                                SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                                SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                                Malicious:true
                                                                                Preview: ..127.0.0.1
                                                                                \Device\ConDrv
                                                                                Process:C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):298
                                                                                Entropy (8bit):4.943030742860529
                                                                                Encrypted:false
                                                                                SSDEEP:6:zx3M1tFAbQtU1R30qyMstwYVoRRZBXVN+J0fFdCsq2UTiMdH8stCal+n:zK13I30ZMt9BFN+QdCT2UftCM+
                                                                                MD5:6A9888952541A41F033EB114C24DC902
                                                                                SHA1:41903D7C8F31013C44572E09D97B9AAFBBCE77E6
                                                                                SHA-256:41A61D0084CD7884BEA1DF02ED9213CB8C83F4034F5C8156FC5B06D6A3E133CE
                                                                                SHA-512:E6AC898E67B4052375FDDFE9894B26D504A7827917BF3E02772CFF45C3FA7CC5E0EFFDC701D208E0DB89F05E42F195B1EC890F316BEE5CB8239AB45444DAA65E
                                                                                Malicious:false
                                                                                Preview: Microsoft (R) Build Engine version 4.7.3056.0..[Microsoft .NET Framework, version 4.0.30319.42000]..Copyright (C) Microsoft Corporation. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                                Static File Info

                                                                                General

                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                Entropy (8bit):6.069011681162613
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:Quote-TSL-1037174_4810.exe
                                                                                File size:448961
                                                                                MD5:deb5412f0b0201d045e2007503bbb283
                                                                                SHA1:4086c81e9c51db9e242c604bfa99ad217a45986d
                                                                                SHA256:c770d9d870614a8a39844cd1f564bb823944f8d4d25f7d68f15b1401fb08e4e9
                                                                                SHA512:9310a18a3602d175dd5235ac464ced734aeb1bc5542bc94b45d1be1b3d8580fb9acc8fd3834d27025983b87a54ddaacbed9c923e2a79205bfe0ce0aa09e2cf78
                                                                                SSDEEP:6144:usUlNPJU0e7dkV3ZLFJVsA2mQ7fGUgYCrQOd:sPJU1763Z7VPw7+Ugfxd
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\.........

                                                                                File Icon

                                                                                Icon Hash:0000000000000000

                                                                                Static PE Info

                                                                                General

                                                                                Entrypoint:0x40323c
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x4B1AE3C6 [Sat Dec 5 22:50:46 2009 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:099c0646ea7282d232219f8807883be0

                                                                                Entrypoint Preview

                                                                                Instruction
                                                                                sub esp, 00000180h
                                                                                push ebx
                                                                                push ebp
                                                                                push esi
                                                                                xor ebx, ebx
                                                                                push edi
                                                                                mov dword ptr [esp+18h], ebx
                                                                                mov dword ptr [esp+10h], 00409130h
                                                                                xor esi, esi
                                                                                mov byte ptr [esp+14h], 00000020h
                                                                                call dword ptr [00407030h]
                                                                                push 00008001h
                                                                                call dword ptr [004070B4h]
                                                                                push ebx
                                                                                call dword ptr [0040727Ch]
                                                                                push 00000008h
                                                                                mov dword ptr [00423F58h], eax
                                                                                call 00007FBB987DD88Eh
                                                                                mov dword ptr [00423EA4h], eax
                                                                                push ebx
                                                                                lea eax, dword ptr [esp+34h]
                                                                                push 00000160h
                                                                                push eax
                                                                                push ebx
                                                                                push 0041F458h
                                                                                call dword ptr [00407158h]
                                                                                push 004091B8h
                                                                                push 004236A0h
                                                                                call 00007FBB987DD541h
                                                                                call dword ptr [004070B0h]
                                                                                mov edi, 00429000h
                                                                                push eax
                                                                                push edi
                                                                                call 00007FBB987DD52Fh
                                                                                push ebx
                                                                                call dword ptr [0040710Ch]
                                                                                cmp byte ptr [00429000h], 00000022h
                                                                                mov dword ptr [00423EA0h], eax
                                                                                mov eax, edi
                                                                                jne 00007FBB987DAC8Ch
                                                                                mov byte ptr [esp+14h], 00000022h
                                                                                mov eax, 00429001h
                                                                                push dword ptr [esp+14h]
                                                                                push eax
                                                                                call 00007FBB987DD022h
                                                                                push eax
                                                                                call dword ptr [0040721Ch]
                                                                                mov dword ptr [esp+1Ch], eax
                                                                                jmp 00007FBB987DACE5h
                                                                                cmp cl, 00000020h
                                                                                jne 00007FBB987DAC88h
                                                                                inc eax
                                                                                cmp byte ptr [eax], 00000020h
                                                                                je 00007FBB987DAC7Ch
                                                                                cmp byte ptr [eax], 00000022h
                                                                                mov byte ptr [eax+eax+00h], 00000000h

                                                                                Rich Headers

                                                                                Programming Language:
                                                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                                                Data Directories

                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x28e70.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                Sections

                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x5a5a0x5c00False0.660453464674data6.41769823686IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x70000x11900x1200False0.4453125data5.18162709925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x90000x1af980x400False0.55859375data4.70902740305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x2c0000x28e700x29000False0.0739269721799data0.988562741976IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                Resources

                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0x2c3100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                                                                RT_ICON0x3cb380x94a8dataEnglishUnited States
                                                                                RT_ICON0x45fe00x5488dataEnglishUnited States
                                                                                RT_ICON0x4b4680x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294965503, next used block 4280287231EnglishUnited States
                                                                                RT_ICON0x4f6900x25a8dataEnglishUnited States
                                                                                RT_ICON0x51c380x10a8dataEnglishUnited States
                                                                                RT_ICON0x52ce00xdc8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                                                                RT_ICON0x53aa80x988dataEnglishUnited States
                                                                                RT_ICON0x544300x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                                                RT_DIALOG0x548980x100dataEnglishUnited States
                                                                                RT_DIALOG0x549980x11cdataEnglishUnited States
                                                                                RT_DIALOG0x54ab80x60dataEnglishUnited States
                                                                                RT_GROUP_ICON0x54b180x84dataEnglishUnited States
                                                                                RT_MANIFEST0x54ba00x2ccXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                                                Imports

                                                                                DLLImport
                                                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                                                Possible Origin

                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States

                                                                                Network Behavior

                                                                                Network Port Distribution

                                                                                TCP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 11, 2021 13:21:04.454927921 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:04.528718948 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:04.528865099 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:04.716147900 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:04.716617107 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:04.790772915 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:04.791491032 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:04.868208885 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:04.915411949 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:04.938837051 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.026505947 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.026534081 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.026546001 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.026560068 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.026655912 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.026715994 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.032466888 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.043819904 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.118057013 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.165466070 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.430200100 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.504817963 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.506795883 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.581099033 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.583034992 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.662856102 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.664150953 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.738085985 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.738545895 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.849030018 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.849663973 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.923571110 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.925147057 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.925338984 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.926058054 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.926398039 CEST49770587192.168.2.4194.28.84.37
                                                                                Jun 11, 2021 13:21:05.999243975 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.999295950 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:05.999651909 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:06.000081062 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:06.005424976 CEST58749770194.28.84.37192.168.2.4
                                                                                Jun 11, 2021 13:21:06.056117058 CEST49770587192.168.2.4194.28.84.37

                                                                                UDP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 11, 2021 13:18:55.702606916 CEST5309753192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:18:55.753992081 CEST53530978.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:18:56.664014101 CEST4925753192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:18:56.717088938 CEST53492578.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:18:57.796488047 CEST6238953192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:18:57.847105026 CEST53623898.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:18:59.114075899 CEST4991053192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:18:59.167464018 CEST53499108.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:00.006516933 CEST5585453192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:00.059524059 CEST53558548.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:01.478553057 CEST6454953192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:01.529217958 CEST53645498.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:02.276595116 CEST6315353192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:02.327080011 CEST53631538.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:03.767395020 CEST5299153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:03.825901985 CEST53529918.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:04.950159073 CEST5370053192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:05.000334978 CEST53537008.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:06.167848110 CEST5172653192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:06.218069077 CEST53517268.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:07.657063961 CEST5679453192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:07.711707115 CEST53567948.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:09.470839024 CEST5653453192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:09.522155046 CEST53565348.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:11.051964998 CEST5662753192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:11.102130890 CEST53566278.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:12.425761938 CEST5662153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:12.476281881 CEST53566218.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:13.363559961 CEST6311653192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:13.413616896 CEST53631168.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:14.357387066 CEST6407853192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:14.407419920 CEST53640788.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:15.631155014 CEST6480153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:15.681289911 CEST53648018.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:16.423212051 CEST6172153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:16.476000071 CEST53617218.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:18.661943913 CEST5125553192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:18.712230921 CEST53512558.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:26.758990049 CEST6152253192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:26.828430891 CEST53615228.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:43.680207014 CEST5233753192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:43.818207026 CEST53523378.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:44.414587021 CEST5504653192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:44.476222992 CEST53550468.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:44.631582022 CEST4961253192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:44.707420111 CEST53496128.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:45.062336922 CEST4928553192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:45.126400948 CEST53492858.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:45.606440067 CEST5060153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:45.759912014 CEST53506018.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:46.322932959 CEST6087553192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:46.385080099 CEST53608758.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:46.977027893 CEST5644853192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:47.041770935 CEST53564488.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:47.529011965 CEST5917253192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:47.590732098 CEST53591728.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:48.420711994 CEST6242053192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:48.482470036 CEST53624208.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:49.372217894 CEST6057953192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:49.434217930 CEST53605798.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:49.993207932 CEST5018353192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:50.043271065 CEST53501838.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:19:50.986712933 CEST6153153192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:19:51.049527884 CEST53615318.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:20:01.154119015 CEST4922853192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:20:01.214184999 CEST53492288.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:20:01.389753103 CEST5979453192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:20:01.448281050 CEST53597948.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:20:03.952881098 CEST5591653192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:20:04.014728069 CEST53559168.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:20:35.171495914 CEST5275253192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:20:35.240530968 CEST53527528.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:20:36.984265089 CEST6054253192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:20:37.034384966 CEST53605428.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:21:04.146356106 CEST6068953192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:21:04.207077026 CEST53606898.8.8.8192.168.2.4
                                                                                Jun 11, 2021 13:21:04.229811907 CEST6420653192.168.2.48.8.8.8
                                                                                Jun 11, 2021 13:21:04.319475889 CEST53642068.8.8.8192.168.2.4

                                                                                DNS Queries

                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                Jun 11, 2021 13:21:04.146356106 CEST192.168.2.48.8.8.80x1834Standard query (0)mail.buynsell.com.pkA (IP address)IN (0x0001)
                                                                                Jun 11, 2021 13:21:04.229811907 CEST192.168.2.48.8.8.80xc471Standard query (0)mail.buynsell.com.pkA (IP address)IN (0x0001)

                                                                                DNS Answers

                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                Jun 11, 2021 13:21:04.207077026 CEST8.8.8.8192.168.2.40x1834No error (0)mail.buynsell.com.pkbuynsell.com.pkCNAME (Canonical name)IN (0x0001)
                                                                                Jun 11, 2021 13:21:04.207077026 CEST8.8.8.8192.168.2.40x1834No error (0)buynsell.com.pk194.28.84.37A (IP address)IN (0x0001)
                                                                                Jun 11, 2021 13:21:04.319475889 CEST8.8.8.8192.168.2.40xc471No error (0)mail.buynsell.com.pkbuynsell.com.pkCNAME (Canonical name)IN (0x0001)
                                                                                Jun 11, 2021 13:21:04.319475889 CEST8.8.8.8192.168.2.40xc471No error (0)buynsell.com.pk194.28.84.37A (IP address)IN (0x0001)

                                                                                SMTP Packets

                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                Jun 11, 2021 13:21:04.716147900 CEST58749770194.28.84.37192.168.2.4220-iron.fastbighost.net ESMTP Exim 4.94.2 #2 Fri, 11 Jun 2021 14:21:04 +0300
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Jun 11, 2021 13:21:04.716617107 CEST49770587192.168.2.4194.28.84.37EHLO 066656
                                                                                Jun 11, 2021 13:21:04.790772915 CEST58749770194.28.84.37192.168.2.4250-iron.fastbighost.net Hello 066656 [84.17.52.18]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Jun 11, 2021 13:21:04.791491032 CEST49770587192.168.2.4194.28.84.37STARTTLS
                                                                                Jun 11, 2021 13:21:04.868208885 CEST58749770194.28.84.37192.168.2.4220 TLS go ahead

                                                                                Code Manipulations

                                                                                Statistics

                                                                                Behavior

                                                                                Click to jump to process

                                                                                System Behavior

                                                                                General

                                                                                Start time:13:19:01
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                                                                                Imagebase:0x400000
                                                                                File size:448961 bytes
                                                                                MD5 hash:DEB5412F0B0201D045E2007503BBB283
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.647491799.0000000009B10000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                General

                                                                                Start time:13:19:02
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\Quote-TSL-1037174_4810.exe'
                                                                                Imagebase:0x980000
                                                                                File size:261728 bytes
                                                                                MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.671831008.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.674949415.0000000002E21000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:13:19:11
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                                                                                Imagebase:0x400000
                                                                                File size:448961 bytes
                                                                                MD5 hash:DEB5412F0B0201D045E2007503BBB283
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.675091117.0000000009970000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 14%, Metadefender, Browse
                                                                                • Detection: 59%, ReversingLabs
                                                                                Reputation:low

                                                                                General

                                                                                Start time:13:19:12
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                                                                                Imagebase:0x1c0000
                                                                                File size:261728 bytes
                                                                                MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.685992308.00000000005C2000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.687171582.00000000024C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:13:19:19
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\bnqw\amve.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                                                                                Imagebase:0x400000
                                                                                File size:448961 bytes
                                                                                MD5 hash:DEB5412F0B0201D045E2007503BBB283
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.686576879.0000000009830000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                General

                                                                                Start time:13:19:21
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\bnqw\amve.exe'
                                                                                Imagebase:0x790000
                                                                                File size:261728 bytes
                                                                                MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.904595118.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.906095830.0000000002CF1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:13:19:57
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe'
                                                                                Imagebase:0x120000
                                                                                File size:261728 bytes
                                                                                MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Antivirus matches:
                                                                                • Detection: 0%, Metadefender, Browse
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:13:19:58
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff724c50000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                General

                                                                                Start time:13:20:06
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\AppData\Roaming\NewApp\NewApp.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\AppData\Roaming\NewApp\NewApp.exe'
                                                                                Imagebase:0xcd0000
                                                                                File size:261728 bytes
                                                                                MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Reputation:moderate

                                                                                General

                                                                                Start time:13:20:06
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff724c50000
                                                                                File size:625664 bytes
                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high

                                                                                Disassembly

                                                                                Code Analysis

                                                                                Reset < >