Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Cotizaci#U00f3n P13000996 pdf.exe

Overview

General Information

Sample name:Cotizaci#U00f3n P13000996 pdf.exe
renamed because original name is a hash value
Original sample name:Cotizacin P13000996 pdf.exe
Analysis ID:1528679
MD5:cd3a6f4e87632d933a99502e32a34b73
SHA1:0033645d2b94cf4e56c8ea6eb8508e3c2ee77b11
SHA256:b7c70cd300732d7faad3e5a898a93b0dbff2a62ec9555eef0997af34baa721ca
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Cotizaci#U00f3n P13000996 pdf.exe (PID: 7400 cmdline: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
    • powershell.exe (PID: 7576 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7632 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8048 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7660 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • jHJQWf.exe (PID: 8012 cmdline: C:\Users\user\AppData\Roaming\jHJQWf.exe MD5: CD3A6F4E87632D933A99502E32A34B73)
    • schtasks.exe (PID: 6448 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • jHJQWf.exe (PID: 6680 cmdline: "C:\Users\user\AppData\Roaming\jHJQWf.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
    • jHJQWf.exe (PID: 7092 cmdline: "C:\Users\user\AppData\Roaming\jHJQWf.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
  • ZUHFqcY.exe (PID: 7612 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
    • schtasks.exe (PID: 7924 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 8004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ZUHFqcY.exe (PID: 7744 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
  • ZUHFqcY.exe (PID: 7532 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
    • schtasks.exe (PID: 7448 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpD6A0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ZUHFqcY.exe (PID: 6524 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: CD3A6F4E87632D933A99502E32A34B73)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": "    w#chNV#1"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.2556220086.0000000002EBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000019.00000002.2556822159.000000000324C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000010.00000002.2556220086.0000000002E86000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000014.00000002.1513664213.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 39 entries
            SourceRuleDescriptionAuthorStrings
            11.2.jHJQWf.exe.3e392e8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              11.2.jHJQWf.exe.3e392e8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                11.2.jHJQWf.exe.3e392e8.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x32542:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x325b4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3263e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x326d0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3273a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x327ac:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32842:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x328d2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 48 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ParentProcessId: 7400, ParentProcessName: Cotizaci#U00f3n P13000996 pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ProcessId: 7576, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ProcessId: 7836, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZUHFqcY
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ParentProcessId: 7400, ParentProcessName: Cotizaci#U00f3n P13000996 pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ProcessId: 7576, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\jHJQWf.exe, ParentImage: C:\Users\user\AppData\Roaming\jHJQWf.exe, ParentProcessId: 8012, ParentProcessName: jHJQWf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp", ProcessId: 6448, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, Initiated: true, ProcessId: 7836, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49705
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ParentProcessId: 7400, ParentProcessName: Cotizaci#U00f3n P13000996 pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", ProcessId: 7660, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ParentProcessId: 7400, ParentProcessName: Cotizaci#U00f3n P13000996 pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ProcessId: 7576, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe, ParentProcessId: 7400, ParentProcessName: Cotizaci#U00f3n P13000996 pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp", ProcessId: 7660, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 20.2.ZUHFqcY.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": " w#chNV#1"}
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeVirustotal: Detection: 58%Perma Link
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeReversingLabs: Detection: 47%
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeVirustotal: Detection: 58%Perma Link
                    Source: Cotizaci#U00f3n P13000996 pdf.exeReversingLabs: Detection: 47%
                    Source: Cotizaci#U00f3n P13000996 pdf.exeVirustotal: Detection: 58%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeJoe Sandbox ML: detected
                    Source: Cotizaci#U00f3n P13000996 pdf.exeJoe Sandbox ML: detected
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 4x nop then jmp 06C79DE9h0_2_06C79F9E
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 4x nop then jmp 071B90C9h11_2_071B927E
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 4x nop then jmp 059C90C9h17_2_059C927E
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 4x nop then jmp 073C90C9h22_2_073C927E

                    Networking

                    barindex
                    Source: Yara matchFile source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.7:49705 -> 208.91.198.143:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: unknownDNS query: name: ip-api.com
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.7:49705 -> 208.91.198.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.00000000014B6000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: ZUHFqcY.exe, 00000019.00000002.2553428808.00000000014B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting0
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1324801590.000000000290E000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1370783365.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1445199267.000000000280E000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1533879364.0000000003171000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, X3fxBL.cs.Net Code: UdKYqv
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, X3fxBL.cs.Net Code: UdKYqv

                    System Summary

                    barindex
                    Source: 11.2.jHJQWf.exe.3e392e8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 17.2.ZUHFqcY.exe.3857a30.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 22.2.ZUHFqcY.exe.41b7860.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 22.2.ZUHFqcY.exe.417be40.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.jHJQWf.exe.3dfd8c8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_026FD3040_2_026FD304
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C70E080_2_06C70E08
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C742400_2_06C74240
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C7630F0_2_06C7630F
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C763200_2_06C76320
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C73E080_2_06C73E08
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C7CC600_2_06C7CC60
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C70DF90_2_06C70DF9
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C75A480_2_06C75A48
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C739D00_2_06C739D0
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_08572E900_2_08572E90
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_085761080_2_08576108
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_085735F80_2_085735F8
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_0857AE970_2_0857AE97
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_0857AEA80_2_0857AEA8
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014DE2209_2_014DE220
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014D4AD09_2_014D4AD0
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014DADF09_2_014DADF0
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014D3EB89_2_014D3EB8
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014D42009_2_014D4200
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B366109_2_06B36610
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B327589_2_06B32758
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B355B89_2_06B355B8
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B3BC889_2_06B3BC88
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B37DA09_2_06B37DA0
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B376C09_2_06B376C0
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B300409_2_06B30040
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_06B35D109_2_06B35D10
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_02BCD30411_2_02BCD304
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_05317A4011_2_05317A40
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_0531000711_2_05310007
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_0531004011_2_05310040
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_05313F6811_2_05313F68
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_05317A3111_2_05317A31
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B0E0811_2_071B0E08
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B3E0811_2_071B3E08
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B0DFB11_2_071B0DFB
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B630F11_2_071B630F
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B632011_2_071B6320
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B5A4811_2_071B5A48
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B424011_2_071B4240
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071B39D011_2_071B39D0
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_071BC00011_2_071BC000
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_0151E21016_2_0151E210
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_0151A22016_2_0151A220
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_01514AD016_2_01514AD0
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_0151ADE016_2_0151ADE0
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_01513EB816_2_01513EB8
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_0151420016_2_01514200
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA661016_2_06BA6610
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA275816_2_06BA2758
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA55B816_2_06BA55B8
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BABC8816_2_06BABC88
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA7DA016_2_06BA7DA0
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA5D1016_2_06BA5D10
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA76C016_2_06BA76C0
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 16_2_06BA004016_2_06BA0040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_024DD30417_2_024DD304
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C0E0817_2_059C0E08
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C39D017_2_059C39D0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C0DFA17_2_059C0DFA
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059CBF4017_2_059CBF40
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C3E0817_2_059C3E08
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C630F17_2_059C630F
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C632017_2_059C6320
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C5A4817_2_059C5A48
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_059C424017_2_059C4240
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_02D64AD020_2_02D64AD0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_02D63EB820_2_02D63EB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_02D6DCE820_2_02D6DCE8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_02D6420020_2_02D64200
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB661020_2_06AB6610
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB348020_2_06AB3480
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB55B820_2_06AB55B8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06ABBC7920_2_06ABBC79
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB7DA020_2_06AB7DA0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB76C020_2_06AB76C0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB274820_2_06AB2748
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB004020_2_06AB0040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 20_2_06AB5CFB20_2_06AB5CFB
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_0306D30422_2_0306D304
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_05CA623022_2_05CA6230
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_05CAAE9722_2_05CAAE97
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_05CAAEA822_2_05CAAEA8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C0E0822_2_073C0E08
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073CBF4022_2_073CBF40
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C3E0822_2_073C3E08
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C0DFA22_2_073C0DFA
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C632022_2_073C6320
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C630F22_2_073C630F
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C5A4822_2_073C5A48
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C424022_2_073C4240
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C39B122_2_073C39B1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C39D022_2_073C39D0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016D4AD025_2_016D4AD0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016DDCE825_2_016DDCE8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016D3EB825_2_016D3EB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016DAE9E25_2_016DAE9E
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016D420025_2_016D4200
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_016DA8B825_2_016DA8B8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB661025_2_06BB6610
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB275825_2_06BB2758
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB55B825_2_06BB55B8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BBBC8825_2_06BBBC88
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB7DA025_2_06BB7DA0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB76C025_2_06BB76C0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB004025_2_06BB0040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06BB5D1025_2_06BB5D10
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06CAE55025_2_06CAE550
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06CA608825_2_06CA6088
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06CA7B7825_2_06CA7B78
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06CA792025_2_06CA7920
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1329784750.0000000007173000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUZWH.exe@ vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000000.1285709787.0000000000602000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUZWH.exe@ vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1323841652.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1324801590.0000000002966000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1329209888.0000000006F60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2552156896.00000000010F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exeBinary or memory string: OriginalFilenameUZWH.exe@ vs Cotizaci#U00f3n P13000996 pdf.exe
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 11.2.jHJQWf.exe.3e392e8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 17.2.ZUHFqcY.exe.3857a30.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 22.2.ZUHFqcY.exe.41b7860.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 22.2.ZUHFqcY.exe.417be40.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.jHJQWf.exe.3dfd8c8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: jHJQWf.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ZUHFqcY.exe.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, t1Bk2Cij9OL7hxApyp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, t1Bk2Cij9OL7hxApyp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, d1gtjFWgBVSGOx5AjT.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@33/20@3/2
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile created: C:\Users\user\AppData\Roaming\jHJQWf.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7644:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1448:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8004:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7684:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMutant created: \Sessions\1\BaseNamedObjects\FWiJhSZjRaDRXVTmaB
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp8543.tmpJump to behavior
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Cotizaci#U00f3n P13000996 pdf.exeReversingLabs: Detection: 47%
                    Source: Cotizaci#U00f3n P13000996 pdf.exeVirustotal: Detection: 58%
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile read: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe C:\Users\user\AppData\Roaming\jHJQWf.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A0.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpD6A0.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A0.tmp"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpD6A0.tmp"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: textshaping.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: textshaping.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, appForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, appForm.cs.Net Code: InitializeComponent
                    Source: jHJQWf.exe.0.dr, appForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
                    Source: jHJQWf.exe.0.dr, appForm.cs.Net Code: InitializeComponent
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, d1gtjFWgBVSGOx5AjT.cs.Net Code: hPxCIUWDZT System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.5ad0000.4.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, d1gtjFWgBVSGOx5AjT.cs.Net Code: hPxCIUWDZT System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.28e8980.0.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: ZUHFqcY.exe.9.dr, appForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
                    Source: ZUHFqcY.exe.9.dr, appForm.cs.Net Code: InitializeComponent
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_026FF498 pushad ; iretd 0_2_026FF499
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_06C70007 push es; ret 0_2_06C7001C
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_0857C287 pushad ; ret 0_2_0857C28A
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_08575EDD push 0000003Bh; ret 0_2_08575EDF
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_08575F0B push 0000003Bh; ret 0_2_08575F0D
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 0_2_0857B3E0 pushfd ; iretd 0_2_0857B3E9
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_02BCF498 pushad ; iretd 11_2_02BCF499
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeCode function: 11_2_02BCF49B push esp; iretd 11_2_02BCF4A1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_024DF498 pushad ; iretd 17_2_024DF499
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 17_2_024DF49A push esp; iretd 17_2_024DF4A1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_0306F498 pushad ; iretd 22_2_0306F499
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_05CAB3E0 pushfd ; iretd 22_2_05CAB3E9
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_05CAC287 pushad ; ret 22_2_05CAC28A
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C84C0 pushad ; iretd 22_2_073C84C1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 22_2_073C8040 push eax; retf 22_2_073C8041
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 25_2_06CADAB2 pushad ; ret 25_2_06CADABD
                    Source: Cotizaci#U00f3n P13000996 pdf.exeStatic PE information: section name: .text entropy: 7.903574933359164
                    Source: jHJQWf.exe.0.drStatic PE information: section name: .text entropy: 7.903574933359164
                    Source: ZUHFqcY.exe.9.drStatic PE information: section name: .text entropy: 7.903574933359164
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, GaowXKVR2aQlewcGrF.csHigh entropy of concatenated method names: 'ToString', 'VylHUeD0y1', 'TG3H1QcqBJ', 'mAJHcXNsAM', 'FPLHyE388n', 'Ex8HLuVye5', 'mQ3HEotB9g', 'e42HMCN0xq', 'oZCH6AsbWh', 'QJAHhwL2Ig'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, kGhQx8zW7tD4xUsS0k.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bjs4ZisBJ9', 'Gah4niDSSj', 'fNb4H1LVY3', 'h1q4B9tkAi', 'r6M4Fuy1Kx', 'jYO44dEcOR', 'Tl94KYJ7dk'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, Hgx8lB77ZHLunMZtJR4.csHigh entropy of concatenated method names: 'ToString', 'ahQKTX8yO1', 'LsGKC8OnbT', 'kx0KNII5aE', 'leaK5SF89a', 'TlPKbBvtGl', 'YmBKl6xZUT', 'OFAKXYvjXw', 'khtcTRgVZ0vfWsrEowT', 'Nq7b74gS6eiK70wDucg'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, jlAbg9bsAksQbn0BSt.csHigh entropy of concatenated method names: 'Dispose', 'A5m7a3Q87S', 'W7ur1d6Qd8', 'YKBFF3uqgW', 'rIx7xiO6RB', 'SCp7zZV244', 'ProcessDialogKey', 'IQtr8boXwj', 'B4Fr7H9HCm', 'tqmrrJvbZ7'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, DnVEL5hMsXVFgwadNK.csHigh entropy of concatenated method names: 'g2bYdUuH9N', 'I2RYsGF07S', 'cLmYI0fLJu', 'gUFYQiLa3f', 'Ry1Yot4sPQ', 'peJY2Pj098', 'AgEYGlhmDb', 'tihYiKkSWg', 'NuCYpe4M5A', 'xtEYmFMHHP'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, nVEBu9rlohQqSGc472.csHigh entropy of concatenated method names: 'BoXItfIAk', 'RkOQN6IGQ', 'n9525b6Fi', 'wUZG6d5BA', 'Ot0p3bQ9D', 'agOmjMyuS', 'IoDfQpphGyAyoL7a56', 'GXSZoXoP60Dgg9ayCa', 'neiFbHLN5', 'EmuKoUygj'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, t1Bk2Cij9OL7hxApyp.csHigh entropy of concatenated method names: 'IXgb3BRBH7', 'LmHbjLLj5U', 'r1pbVnkCQF', 'rYxbO1SGfh', 'xh1bvcQbol', 'HpCbA9xSUe', 'MdWbJ8huPy', 'YLqbSoVfJn', 'OUBbalUCAJ', 'D72bxEMCdx'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, Iu970e78CcvqscLfowb.csHigh entropy of concatenated method names: 'PJa4dvQ3Y8', 'MPc4sgG8S3', 'mAG4IquAh2', 'sVh4QKF6jQ', 'fK74oFwMdc', 'C7q42eD4RW', 'GAQ4G9TEli', 'fdg4imWRD6', 'wY74ptGU5k', 'Vfg4mAkvyC'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, zxiO6RSBVCpZV244cQ.csHigh entropy of concatenated method names: 'T49F53gePi', 'QqmFbUhaho', 'I21FlYvPOs', 'upcFXTEbvY', 'uwXF962L4s', 'yScFYIx7i0', 'UQMFWUL1k6', 'Tm3Fu9VYsS', 'BbXFgtosNg', 'rYhFPPL7I3'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, LHJoQNfyxfUVJRXEYU.csHigh entropy of concatenated method names: 'jtb9NOWrcE', 'be29bB5vI9', 'Brc9XCXhgx', 'TcZ9Y3oRZZ', 'yuS9WA0Vhe', 'hh8XvYSGpI', 'pJJXAXdkUH', 'mGZXJ2qIHp', 'uOJXS594mO', 'HiHXaDeaTM'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, MTeQYWpTVZnx5PdeIa.csHigh entropy of concatenated method names: 'QsRlQ0FIcB', 'h1hl2nhZ45', 'Mw3li0RWtE', 'wiNlpVRpPv', 'iPblnp3brf', 'Hx9lHXOTXB', 'UxnlBBhIOD', 'KgYlFLm4XA', 'L6Tl4IyJHa', 'ik3lKUT2x6'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, xxVZHBMeXZjnCaCF2V.csHigh entropy of concatenated method names: 'axTY5qST6l', 'OPGYl0cKLx', 'AJZY95bGrm', 'VVp9xeLyOF', 'D7t9zSweNA', 'OPlY8WBddt', 'Vq8Y7bkhIF', 'Wf0YroBBmp', 'siRYTV0089', 'rwjYCA5BWM'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, vboXwjao4FH9HCmDqm.csHigh entropy of concatenated method names: 'miAFfTfeLc', 'O4mF1xqAbP', 'kjcFcuAgwi', 'meTFy4LLnd', 'qxLF3FUXKd', 'MJcFLfeqt0', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, ewdjABCc9fRB285i6r.csHigh entropy of concatenated method names: 'dgD7Y1Bk2C', 'R9O7WL7hxA', 'kTV7gZnx5P', 'xeI7PaOGbO', 'epT7nuXMHJ', 'BQN7HyxfUV', 'DJLTPF9rlMftA2497Z', 'syBcg8nMtwwTxxSyGj', 'Bkl77oR8xR', 'u627TQ1A6q'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, WvbZ7MxouRorWu0iPT.csHigh entropy of concatenated method names: 'BF6470p0tO', 'vnr4T3KALe', 'X3W4Cvg9JQ', 'To445hw9Zv', 'ip44b4MY37', 'QLv4Xfx9C2', 'bCM49LNdMB', 'bOSFJjEEDM', 'iaaFSq1AEm', 'PhLFaM1pQj'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, vxkXWX30uyfCGNcUlA.csHigh entropy of concatenated method names: 'BcOnwoe8Bq', 'ArWnkFZWAp', 'j0wn3echV9', 'Ca5njafGQK', 'u98n1S8Kek', 'lcgncNFhhh', 'wP2nyTfjUn', 'K3onLDmltg', 'JgFnEIiL0C', 'hxbnM0ktHp'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, d1gtjFWgBVSGOx5AjT.csHigh entropy of concatenated method names: 'n8GTN8EFZD', 'NoNT5Y8EeN', 'XHpTbjyd6p', 'TjmTldL46r', 'iWNTXAu50G', 'WPxT9409C3', 'HPcTYEvQBg', 'JChTWN3gll', 'eAnTufd4wc', 'oSOTgGn45J'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, hcT8ZLlpGEGA22NQ19.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'avqraDWDUw', 'CkNrxjItPl', 'Wi3rzVRN07', 'w8hT8J6ucZ', 'jqXT7KInFG', 'G0KTrtJn0O', 'aJyTTVGVSY', 'HZ3yoWXts4FKMoohc3h'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, s2A4VA0KwXsZsunAiV.csHigh entropy of concatenated method names: 'K8uZifLHGY', 'DsWZp1DHiV', 'OLFZfqkN2G', 'rARZ1aX732', 'KbwZyrKgnr', 'tYXZLWdLQb', 'pGVZMY7BSj', 'GBhZ6pWFNo', 'nksZw3aOvJ', 'kIRZUUimYN'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, hujg0XAwssmBOTDeL8.csHigh entropy of concatenated method names: 'kmkBSh0aHq', 'JntBxhoyAs', 'BPSF8nGZ9w', 'QcjF7H5ZYa', 'IRUBUKJokT', 'XCYBkV7xrN', 'UupB0llhMi', 'kbmB3v8YXR', 'oySBjqs7pC', 'gRGBVxY0Rt'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, UbCkuBEUJrMgmcxNvt.csHigh entropy of concatenated method names: 'edE9Vux0yP', 'Q7I9OPZNEH', 'gJ39vC8UlB', 'ToString', 'Jwp9AearTo', 'wQn9JwR1CO', 'ouWikFCKcLOdPV6cSyU', 'vH66SmCcsHfw414gYTj', 'cuSUcJClByLNpxcfsH0'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3ac4520.1.raw.unpack, dPZsLr7Tf0fITIIVKGr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mqQK3CWb9u', 'DVtKjD2NZw', 'fkaKVbpUhW', 'wIHKOeByuL', 'rS8KvGbhrh', 'mwnKAbxBc3', 'QLpKJCG9X5'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, GaowXKVR2aQlewcGrF.csHigh entropy of concatenated method names: 'ToString', 'VylHUeD0y1', 'TG3H1QcqBJ', 'mAJHcXNsAM', 'FPLHyE388n', 'Ex8HLuVye5', 'mQ3HEotB9g', 'e42HMCN0xq', 'oZCH6AsbWh', 'QJAHhwL2Ig'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, kGhQx8zW7tD4xUsS0k.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bjs4ZisBJ9', 'Gah4niDSSj', 'fNb4H1LVY3', 'h1q4B9tkAi', 'r6M4Fuy1Kx', 'jYO44dEcOR', 'Tl94KYJ7dk'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, Hgx8lB77ZHLunMZtJR4.csHigh entropy of concatenated method names: 'ToString', 'ahQKTX8yO1', 'LsGKC8OnbT', 'kx0KNII5aE', 'leaK5SF89a', 'TlPKbBvtGl', 'YmBKl6xZUT', 'OFAKXYvjXw', 'khtcTRgVZ0vfWsrEowT', 'Nq7b74gS6eiK70wDucg'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, jlAbg9bsAksQbn0BSt.csHigh entropy of concatenated method names: 'Dispose', 'A5m7a3Q87S', 'W7ur1d6Qd8', 'YKBFF3uqgW', 'rIx7xiO6RB', 'SCp7zZV244', 'ProcessDialogKey', 'IQtr8boXwj', 'B4Fr7H9HCm', 'tqmrrJvbZ7'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, DnVEL5hMsXVFgwadNK.csHigh entropy of concatenated method names: 'g2bYdUuH9N', 'I2RYsGF07S', 'cLmYI0fLJu', 'gUFYQiLa3f', 'Ry1Yot4sPQ', 'peJY2Pj098', 'AgEYGlhmDb', 'tihYiKkSWg', 'NuCYpe4M5A', 'xtEYmFMHHP'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, nVEBu9rlohQqSGc472.csHigh entropy of concatenated method names: 'BoXItfIAk', 'RkOQN6IGQ', 'n9525b6Fi', 'wUZG6d5BA', 'Ot0p3bQ9D', 'agOmjMyuS', 'IoDfQpphGyAyoL7a56', 'GXSZoXoP60Dgg9ayCa', 'neiFbHLN5', 'EmuKoUygj'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, t1Bk2Cij9OL7hxApyp.csHigh entropy of concatenated method names: 'IXgb3BRBH7', 'LmHbjLLj5U', 'r1pbVnkCQF', 'rYxbO1SGfh', 'xh1bvcQbol', 'HpCbA9xSUe', 'MdWbJ8huPy', 'YLqbSoVfJn', 'OUBbalUCAJ', 'D72bxEMCdx'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, Iu970e78CcvqscLfowb.csHigh entropy of concatenated method names: 'PJa4dvQ3Y8', 'MPc4sgG8S3', 'mAG4IquAh2', 'sVh4QKF6jQ', 'fK74oFwMdc', 'C7q42eD4RW', 'GAQ4G9TEli', 'fdg4imWRD6', 'wY74ptGU5k', 'Vfg4mAkvyC'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, zxiO6RSBVCpZV244cQ.csHigh entropy of concatenated method names: 'T49F53gePi', 'QqmFbUhaho', 'I21FlYvPOs', 'upcFXTEbvY', 'uwXF962L4s', 'yScFYIx7i0', 'UQMFWUL1k6', 'Tm3Fu9VYsS', 'BbXFgtosNg', 'rYhFPPL7I3'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, LHJoQNfyxfUVJRXEYU.csHigh entropy of concatenated method names: 'jtb9NOWrcE', 'be29bB5vI9', 'Brc9XCXhgx', 'TcZ9Y3oRZZ', 'yuS9WA0Vhe', 'hh8XvYSGpI', 'pJJXAXdkUH', 'mGZXJ2qIHp', 'uOJXS594mO', 'HiHXaDeaTM'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, MTeQYWpTVZnx5PdeIa.csHigh entropy of concatenated method names: 'QsRlQ0FIcB', 'h1hl2nhZ45', 'Mw3li0RWtE', 'wiNlpVRpPv', 'iPblnp3brf', 'Hx9lHXOTXB', 'UxnlBBhIOD', 'KgYlFLm4XA', 'L6Tl4IyJHa', 'ik3lKUT2x6'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, xxVZHBMeXZjnCaCF2V.csHigh entropy of concatenated method names: 'axTY5qST6l', 'OPGYl0cKLx', 'AJZY95bGrm', 'VVp9xeLyOF', 'D7t9zSweNA', 'OPlY8WBddt', 'Vq8Y7bkhIF', 'Wf0YroBBmp', 'siRYTV0089', 'rwjYCA5BWM'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, vboXwjao4FH9HCmDqm.csHigh entropy of concatenated method names: 'miAFfTfeLc', 'O4mF1xqAbP', 'kjcFcuAgwi', 'meTFy4LLnd', 'qxLF3FUXKd', 'MJcFLfeqt0', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, ewdjABCc9fRB285i6r.csHigh entropy of concatenated method names: 'dgD7Y1Bk2C', 'R9O7WL7hxA', 'kTV7gZnx5P', 'xeI7PaOGbO', 'epT7nuXMHJ', 'BQN7HyxfUV', 'DJLTPF9rlMftA2497Z', 'syBcg8nMtwwTxxSyGj', 'Bkl77oR8xR', 'u627TQ1A6q'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, WvbZ7MxouRorWu0iPT.csHigh entropy of concatenated method names: 'BF6470p0tO', 'vnr4T3KALe', 'X3W4Cvg9JQ', 'To445hw9Zv', 'ip44b4MY37', 'QLv4Xfx9C2', 'bCM49LNdMB', 'bOSFJjEEDM', 'iaaFSq1AEm', 'PhLFaM1pQj'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, vxkXWX30uyfCGNcUlA.csHigh entropy of concatenated method names: 'BcOnwoe8Bq', 'ArWnkFZWAp', 'j0wn3echV9', 'Ca5njafGQK', 'u98n1S8Kek', 'lcgncNFhhh', 'wP2nyTfjUn', 'K3onLDmltg', 'JgFnEIiL0C', 'hxbnM0ktHp'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, d1gtjFWgBVSGOx5AjT.csHigh entropy of concatenated method names: 'n8GTN8EFZD', 'NoNT5Y8EeN', 'XHpTbjyd6p', 'TjmTldL46r', 'iWNTXAu50G', 'WPxT9409C3', 'HPcTYEvQBg', 'JChTWN3gll', 'eAnTufd4wc', 'oSOTgGn45J'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, hcT8ZLlpGEGA22NQ19.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'avqraDWDUw', 'CkNrxjItPl', 'Wi3rzVRN07', 'w8hT8J6ucZ', 'jqXT7KInFG', 'G0KTrtJn0O', 'aJyTTVGVSY', 'HZ3yoWXts4FKMoohc3h'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, s2A4VA0KwXsZsunAiV.csHigh entropy of concatenated method names: 'K8uZifLHGY', 'DsWZp1DHiV', 'OLFZfqkN2G', 'rARZ1aX732', 'KbwZyrKgnr', 'tYXZLWdLQb', 'pGVZMY7BSj', 'GBhZ6pWFNo', 'nksZw3aOvJ', 'kIRZUUimYN'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, hujg0XAwssmBOTDeL8.csHigh entropy of concatenated method names: 'kmkBSh0aHq', 'JntBxhoyAs', 'BPSF8nGZ9w', 'QcjF7H5ZYa', 'IRUBUKJokT', 'XCYBkV7xrN', 'UupB0llhMi', 'kbmB3v8YXR', 'oySBjqs7pC', 'gRGBVxY0Rt'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, UbCkuBEUJrMgmcxNvt.csHigh entropy of concatenated method names: 'edE9Vux0yP', 'Q7I9OPZNEH', 'gJ39vC8UlB', 'ToString', 'Jwp9AearTo', 'wQn9JwR1CO', 'ouWikFCKcLOdPV6cSyU', 'vH66SmCcsHfw414gYTj', 'cuSUcJClByLNpxcfsH0'
                    Source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.6f60000.5.raw.unpack, dPZsLr7Tf0fITIIVKGr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mqQK3CWb9u', 'DVtKjD2NZw', 'fkaKVbpUhW', 'wIHKOeByuL', 'rS8KvGbhrh', 'mwnKAbxBc3', 'QLpKJCG9X5'
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile created: C:\Users\user\AppData\Roaming\jHJQWf.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile opened: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeFile opened: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe:Zone.Identifier read attributes | delete
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 8012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7532, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 26F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 48B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 8590000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 9590000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 9780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: A780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 14D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: 4F20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 2D90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 4D90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 8930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 9930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 9B20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: AB20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 14F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 2E40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory allocated: 4F80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 24D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 27B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 47B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 8560000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9560000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9750000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: A750000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2D60000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2EA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 4EA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2E70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 3110000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2E70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 8CD0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9CD0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9EC0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: AEC0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 16D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 31D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 1710000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5071Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 578Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8374Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 973Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWindow / User API: threadDelayed 3080Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWindow / User API: threadDelayed 2134Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWindow / User API: threadDelayed 726
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWindow / User API: threadDelayed 3924
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 724
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 4208
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 871
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 3612
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 7420Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7744Thread sleep count: 5071 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7912Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7716Thread sleep count: 578 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7932Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7872Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8068Thread sleep count: 3080 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99768s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99530s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8068Thread sleep count: 2134 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -99094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -98077s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97968s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97840s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97717s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97595s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97216s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -97109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe TID: 8036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 8060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -14757395258967632s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2172Thread sleep count: 726 > 30
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2172Thread sleep count: 3924 > 30
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -99766s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -99641s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -99521s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -99188s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98896s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98766s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98641s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98391s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98279s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98171s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -98062s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97953s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97844s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97734s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97515s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97296s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97187s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -97078s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -96968s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exe TID: 2120Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7784Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -11990383647911201s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7964Thread sleep count: 724 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7964Thread sleep count: 4208 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99325s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -99000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98544s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -98134s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97925s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7932Thread sleep time: -97078s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 7860Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -8301034833169293s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5344Thread sleep count: 871 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5344Thread sleep count: 3612 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99764s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99329s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -99094s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -98110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -97985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -97860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -97735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -97610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -97485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1912Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99768Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99530Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98859Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98750Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98641Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98313Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 98077Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97968Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97840Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97717Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97595Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97216Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 97109Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 99766
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 99641
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 99521
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 99188
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98896
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98766
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98641
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98500
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98391
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98279
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98171
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 98062
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97953
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97844
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97734
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97625
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97515
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97406
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97296
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97187
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 97078
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 96968
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99890
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99765
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99546
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99437
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99325
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99219
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99109
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99000
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98890
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98781
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98656
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98544
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98437
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98328
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98134
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97925
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97765
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97656
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97547
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97437
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97328
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97219
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97078
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99764
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99547
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99437
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99329
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99219
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99094
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98985
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98860
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98735
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98610
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98485
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98360
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98235
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98110
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97985
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97860
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97735
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97610
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97485
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: ZUHFqcY.exe, 00000019.00000002.2556822159.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: ZUHFqcY.exe, 00000019.00000002.2556822159.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: ZUHFqcY.exe, 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                    Source: Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFOq
                    Source: jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1532255109.0000000006460000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeCode function: 9_2_014D70B8 CheckRemoteDebuggerPresent,9_2_014D70B8
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess queried: DebugPort
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeMemory written: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeMemory written: C:\Users\user\AppData\Roaming\jHJQWf.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory written: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory written: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeProcess created: C:\Users\user\AppData\Roaming\jHJQWf.exe "C:\Users\user\AppData\Roaming\jHJQWf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A0.tmp"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpD6A0.tmp"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Users\user\AppData\Roaming\jHJQWf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Users\user\AppData\Roaming\jHJQWf.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002EBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.000000000324C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002E86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.0000000003216000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 8012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 7092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 6524, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\jHJQWf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 8012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 7092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 6524, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.ZUHFqcY.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.41b7860.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3e392e8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.jHJQWf.exe.3dfd8c8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.ZUHFqcY.exe.3857a30.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.ZUHFqcY.exe.417be40.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.3957c98.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Cotizaci#U00f3n P13000996 pdf.exe.391c278.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002EBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.000000000324C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002E86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2556822159.0000000003216000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2556220086.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2556274282.0000000002F77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3n P13000996 pdf.exe PID: 7836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 8012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jHJQWf.exe PID: 7092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 6524, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    34
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    Security Account Manager631
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Registry Run Keys / Startup Folder
                    12
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets261
                    Virtualization/Sandbox Evasion
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                    Virtualization/Sandbox Evasion
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528679 Sample: Cotizaci#U00f3n P13000996 pdf.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 66 us2.smtp.mailhostbox.com 2->66 68 ip-api.com 2->68 74 Found malware configuration 2->74 76 Malicious sample detected (through community Yara rule) 2->76 78 Sigma detected: Scheduled temp file as task from temp location 2->78 80 15 other signatures 2->80 8 Cotizaci#U00f3n P13000996 pdf.exe 7 2->8         started        12 jHJQWf.exe 5 2->12         started        14 ZUHFqcY.exe 2->14         started        16 ZUHFqcY.exe 2->16         started        signatures3 process4 file5 58 C:\Users\user\AppData\Roaming\jHJQWf.exe, PE32 8->58 dropped 60 C:\Users\user\...\jHJQWf.exe:Zone.Identifier, ASCII 8->60 dropped 62 C:\Users\user\AppData\Local\...\tmp8543.tmp, XML 8->62 dropped 64 C:\...\Cotizaci#U00f3n P13000996 pdf.exe.log, ASCII 8->64 dropped 94 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->94 96 Adds a directory exclusion to Windows Defender 8->96 98 Injects a PE file into a foreign processes 8->98 18 Cotizaci#U00f3n P13000996 pdf.exe 16 5 8->18         started        23 powershell.exe 23 8->23         started        25 powershell.exe 23 8->25         started        27 schtasks.exe 1 8->27         started        100 Multi AV Scanner detection for dropped file 12->100 102 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->102 104 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->104 29 jHJQWf.exe 12->29         started        35 2 other processes 12->35 106 Machine Learning detection for dropped file 14->106 37 2 other processes 14->37 31 ZUHFqcY.exe 16->31         started        33 schtasks.exe 16->33         started        signatures6 process7 dnsIp8 70 ip-api.com 208.95.112.1, 49703, 49714, 49759 TUT-ASUS United States 18->70 72 us2.smtp.mailhostbox.com 208.91.198.143, 49705, 49720, 49766 PUBLIC-DOMAIN-REGISTRYUS United States 18->72 54 C:\Users\user\AppData\Roaming\...\ZUHFqcY.exe, PE32 18->54 dropped 56 C:\Users\user\...\ZUHFqcY.exe:Zone.Identifier, ASCII 18->56 dropped 82 Tries to steal Mail credentials (via file / registry access) 18->82 84 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->84 86 Loading BitLocker PowerShell Module 23->86 39 conhost.exe 23->39         started        42 conhost.exe 25->42         started        44 WmiPrvSE.exe 25->44         started        46 conhost.exe 27->46         started        88 Tries to harvest and steal browser information (history, passwords, etc) 31->88 48 conhost.exe 33->48         started        50 conhost.exe 35->50         started        52 conhost.exe 37->52         started        file9 signatures10 process11 signatures12 90 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->90 92 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 39->92

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Cotizaci#U00f3n P13000996 pdf.exe47%ReversingLabsByteCode-MSIL.Trojan.GenSteal
                    Cotizaci#U00f3n P13000996 pdf.exe59%VirustotalBrowse
                    Cotizaci#U00f3n P13000996 pdf.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\jHJQWf.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe47%ReversingLabsByteCode-MSIL.Trojan.GenSteal
                    C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe59%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\jHJQWf.exe47%ReversingLabsByteCode-MSIL.Trojan.GenSteal
                    C:\Users\user\AppData\Roaming\jHJQWf.exe59%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    us2.smtp.mailhostbox.com2%VirustotalBrowse
                    ip-api.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                    http://ip-api.com0%URL Reputationsafe
                    http://us2.smtp.mailhostbox.com2%VirustotalBrowse
                    http://ip-api.com/line/?fields=hosting00%VirustotalBrowse
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truetrueunknown
                    ip-api.com
                    208.95.112.1
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    http://ocsp.sectigo.com0ACotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://sectigo.com/CPS0Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2553264071.0000000001336000.00000004.00000020.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2578989621.00000000068CF000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2553339668.000000000144B000.00000004.00000020.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1510235688.00000000011F1000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.0000000006580000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2578677718.000000000658A000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2553428808.0000000001480000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.000000000322F000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ip-api.com/line/?fields=hosting0ZUHFqcY.exe, 00000019.00000002.2553428808.00000000014B6000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      https://account.dyn.com/Cotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://us2.smtp.mailhostbox.comCotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F7D000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E9D000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EFD000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCotizaci#U00f3n P13000996 pdf.exe, 00000000.00000002.1324801590.000000000290E000.00000004.00000800.00020000.00000000.sdmp, Cotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 0000000B.00000002.1370783365.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000011.00000002.1445199267.000000000280E000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000016.00000002.1533879364.0000000003171000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.00000000031DC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ip-api.comCotizaci#U00f3n P13000996 pdf.exe, 00000009.00000002.2556274282.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, jHJQWf.exe, 00000010.00000002.2556220086.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000014.00000002.1513664213.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000019.00000002.2556822159.00000000031DC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      208.91.198.143
                      us2.smtp.mailhostbox.comUnited States
                      394695PUBLIC-DOMAIN-REGISTRYUStrue
                      208.95.112.1
                      ip-api.comUnited States
                      53334TUT-ASUStrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1528679
                      Start date and time:2024-10-08 09:04:34 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 24s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:30
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Cotizaci#U00f3n P13000996 pdf.exe
                      renamed because original name is a hash value
                      Original Sample Name:Cotizacin P13000996 pdf.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@33/20@3/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 290
                      • Number of non-executed functions: 10
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      03:05:33API Interceptor27x Sleep call for process: Cotizaci#U00f3n P13000996 pdf.exe modified
                      03:05:35API Interceptor28x Sleep call for process: powershell.exe modified
                      03:05:37API Interceptor25x Sleep call for process: jHJQWf.exe modified
                      03:05:46API Interceptor49x Sleep call for process: ZUHFqcY.exe modified
                      09:05:36Task SchedulerRun new task: jHJQWf path: C:\Users\user\AppData\Roaming\jHJQWf.exe
                      09:05:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                      09:05:45AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      208.91.198.143z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        New Order PO#86637.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          z1newpo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            z68ORDER.scr.exeGet hashmaliciousAgentTeslaBrowse
                              z17invoice.exeGet hashmaliciousAgentTeslaBrowse
                                z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                                  SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    product_list.xlsGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      SecuriteInfo.com.Other.Malware-gen.12504.4949.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        giehjhgjzJ.htaGet hashmaliciousCobalt Strike, MassLogger RAT, Snake KeyloggerBrowse
                                          208.95.112.1x2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                          • ip-api.com/line/?fields=hosting
                                          PixpFUv4G7.exeGet hashmaliciousQuasar, XWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          H2f8SkAvdV.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                          • ip-api.com/json/?fields=225545
                                          A39tzaySzX.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          Bpz46JayQ4.exeGet hashmaliciousXWormBrowse
                                          • ip-api.com/line/?fields=hosting
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          us2.smtp.mailhostbox.comENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.225
                                          Payment Advice - Advice Ref pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.224
                                          Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.223
                                          SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.225
                                          z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.198.143
                                          z9OutstandingPayment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.223
                                          PAYSLIP.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.224
                                          SWIFT COPY.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.224
                                          SecuriteInfo.com.Win32.RATX-gen.3768.11045.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.223
                                          UPDATED FLOOR PLAN_3D.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.223
                                          ip-api.comx2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                          • 208.95.112.1
                                          z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          http://tcaconnect.ac-page.com/toronto-construction-association-inc/Get hashmaliciousUnknownBrowse
                                          • 51.77.64.70
                                          Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          PixpFUv4G7.exeGet hashmaliciousQuasar, XWormBrowse
                                          • 208.95.112.1
                                          H2f8SkAvdV.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                          • 208.95.112.1
                                          A39tzaySzX.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          PUBLIC-DOMAIN-REGISTRYUSshipping.exeGet hashmaliciousAgentTeslaBrowse
                                          • 207.174.215.249
                                          order2024-10-07_174915.exeGet hashmaliciousAgentTeslaBrowse
                                          • 199.79.62.115
                                          shipping.exeGet hashmaliciousAgentTeslaBrowse
                                          • 207.174.215.249
                                          rInvoiceCM60916_xlx.exeGet hashmaliciousFormBookBrowse
                                          • 119.18.54.27
                                          Pending invoices.exeGet hashmaliciousFormBookBrowse
                                          • 119.18.54.27
                                          z1SupplyInvoiceCM60916_Doc.exeGet hashmaliciousFormBookBrowse
                                          • 119.18.54.27
                                          ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 208.91.199.225
                                          New order.exeGet hashmaliciousAgentTeslaBrowse
                                          • 207.174.215.249
                                          https://octo9.com.ng/Greula/Get hashmaliciousUnknownBrowse
                                          • 208.91.199.242
                                          https://hegekaka.za.com/o/?c3Y9bzM2NV8xX25vbSZyYW5kPVZFNUpaM1U9JnVpZD1VU0VSMTYwOTIwMjRVMjMwOTE2MTk=N0123NGet hashmaliciousUnknownBrowse
                                          • 119.18.48.45
                                          TUT-ASUSx2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                          • 208.95.112.1
                                          z71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          RFQ 002593810024350.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          PixpFUv4G7.exeGet hashmaliciousQuasar, XWormBrowse
                                          • 208.95.112.1
                                          H2f8SkAvdV.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                          • 208.95.112.1
                                          A39tzaySzX.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          Bpz46JayQ4.exeGet hashmaliciousXWormBrowse
                                          • 208.95.112.1
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:true
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2232
                                          Entropy (8bit):5.379460230152629
                                          Encrypted:false
                                          SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//MPUyus:fLHyIFKL3IZ2KRH9Ougss
                                          MD5:47AE6B38874AA66FC6688784E5F2EF18
                                          SHA1:AF71A58235AE5D80BDDA79DE907697354E5553F6
                                          SHA-256:F271AAB7854518D80F39793CBA35D7BFDABBFBCAC9DBD8F5E79EAE393BDC4C98
                                          SHA-512:D8FD735141FBF25FE4EFB88E973F4416A50EC0E065A297BC8B398FF96AD77EE852EA2E66BD3CAFED7C4C9EE9D24742C3D95F03DD13DBC6C1B57BFDB2F40EF1A3
                                          Malicious:false
                                          Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.128215157867174
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTRv
                                          MD5:4470876D0E0D1CA87E18C051AAC28DF0
                                          SHA1:8B85BD757EE2DB775F712EF9B6A12758EDDF1DFD
                                          SHA-256:25489087639934394516A7F8FFCA6A7E81AB996FF6E74C213E4F8A37AC2DCD91
                                          SHA-512:3245A8809A7D2D7D7D096B9C8D5FBAE6A347AE0794E8FE31943C8CA5A12912237E99C8BE7932055759E06A8A00F4029FB93E4D1EBC8127DEFC0E3DCB35CEA256
                                          Malicious:true
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.128215157867174
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTRv
                                          MD5:4470876D0E0D1CA87E18C051AAC28DF0
                                          SHA1:8B85BD757EE2DB775F712EF9B6A12758EDDF1DFD
                                          SHA-256:25489087639934394516A7F8FFCA6A7E81AB996FF6E74C213E4F8A37AC2DCD91
                                          SHA-512:3245A8809A7D2D7D7D096B9C8D5FBAE6A347AE0794E8FE31943C8CA5A12912237E99C8BE7932055759E06A8A00F4029FB93E4D1EBC8127DEFC0E3DCB35CEA256
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.128215157867174
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTRv
                                          MD5:4470876D0E0D1CA87E18C051AAC28DF0
                                          SHA1:8B85BD757EE2DB775F712EF9B6A12758EDDF1DFD
                                          SHA-256:25489087639934394516A7F8FFCA6A7E81AB996FF6E74C213E4F8A37AC2DCD91
                                          SHA-512:3245A8809A7D2D7D7D096B9C8D5FBAE6A347AE0794E8FE31943C8CA5A12912237E99C8BE7932055759E06A8A00F4029FB93E4D1EBC8127DEFC0E3DCB35CEA256
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1600
                                          Entropy (8bit):5.128215157867174
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtHxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTRv
                                          MD5:4470876D0E0D1CA87E18C051AAC28DF0
                                          SHA1:8B85BD757EE2DB775F712EF9B6A12758EDDF1DFD
                                          SHA-256:25489087639934394516A7F8FFCA6A7E81AB996FF6E74C213E4F8A37AC2DCD91
                                          SHA-512:3245A8809A7D2D7D7D096B9C8D5FBAE6A347AE0794E8FE31943C8CA5A12912237E99C8BE7932055759E06A8A00F4029FB93E4D1EBC8127DEFC0E3DCB35CEA256
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):721920
                                          Entropy (8bit):7.895575991661574
                                          Encrypted:false
                                          SSDEEP:12288:uyU5mU+8o1XTsMGQ8rbHJwVKlwIuyrxLr45MF1R43MtK6jO7i1DIYop:vUx4TXGtHFlwIvN05MF1Tj4i1DMp
                                          MD5:CD3A6F4E87632D933A99502E32A34B73
                                          SHA1:0033645D2B94CF4E56C8EA6EB8508E3C2EE77B11
                                          SHA-256:B7C70CD300732D7FAAD3E5A898A93B0DBFF2A62EC9555EEF0997AF34BAA721CA
                                          SHA-512:5BB5961F2C0A22AC96DDBF6865CA73D308DA2A9D0D04B4265DEBEED062FF56E7CFF9CEE8BF428F027F0849F27D01D84FA9B0E0B6902E8B594CEAC2B7DA73DC0B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 47%
                                          • Antivirus: Virustotal, Detection: 59%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.g..............0.................. ... ....@.. .......................`............@.....................................O.... ..@....................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...@.... ......................@..@.reloc.......@......................@..B........................H.......................f...............................................r...p}.....r...p}......}.....(%......(.....*..*....0...........(......s7....sA....sC.....{......s....s)...o&.....s....%..js....o.....%r!..po.....%.o.....oB.....s....%..js....o.....%r-..po.....oB.....s....%..js....o.....%..s'...(....o.....%rA..po.....oB....*..0...........rY..p..sd.....oe......+..*..0..]..........((...r...p().....(*.....,,.(+....r...p(,....rl..p(,....(+......(-......sp.....ok......+..*".(
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):721920
                                          Entropy (8bit):7.895575991661574
                                          Encrypted:false
                                          SSDEEP:12288:uyU5mU+8o1XTsMGQ8rbHJwVKlwIuyrxLr45MF1R43MtK6jO7i1DIYop:vUx4TXGtHFlwIvN05MF1Tj4i1DMp
                                          MD5:CD3A6F4E87632D933A99502E32A34B73
                                          SHA1:0033645D2B94CF4E56C8EA6EB8508E3C2EE77B11
                                          SHA-256:B7C70CD300732D7FAAD3E5A898A93B0DBFF2A62EC9555EEF0997AF34BAA721CA
                                          SHA-512:5BB5961F2C0A22AC96DDBF6865CA73D308DA2A9D0D04B4265DEBEED062FF56E7CFF9CEE8BF428F027F0849F27D01D84FA9B0E0B6902E8B594CEAC2B7DA73DC0B
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 47%
                                          • Antivirus: Virustotal, Detection: 59%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.g..............0.................. ... ....@.. .......................`............@.....................................O.... ..@....................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...@.... ......................@..@.reloc.......@......................@..B........................H.......................f...............................................r...p}.....r...p}......}.....(%......(.....*..*....0...........(......s7....sA....sC.....{......s....s)...o&.....s....%..js....o.....%r!..po.....%.o.....oB.....s....%..js....o.....%r-..po.....oB.....s....%..js....o.....%..s'...(....o.....%rA..po.....oB....*..0...........rY..p..sd.....oe......+..*..0..]..........((...r...p().....(*.....,,.(+....r...p(,....rl..p(,....(+......(-......sp.....ok......+..*".(
                                          Process:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.895575991661574
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:Cotizaci#U00f3n P13000996 pdf.exe
                                          File size:721'920 bytes
                                          MD5:cd3a6f4e87632d933a99502e32a34b73
                                          SHA1:0033645d2b94cf4e56c8ea6eb8508e3c2ee77b11
                                          SHA256:b7c70cd300732d7faad3e5a898a93b0dbff2a62ec9555eef0997af34baa721ca
                                          SHA512:5bb5961f2c0a22ac96ddbf6865ca73d308da2a9d0d04b4265debeed062ff56e7cff9cee8bf428f027f0849f27d01d84fa9b0e0b6902e8b594ceac2b7da73dc0b
                                          SSDEEP:12288:uyU5mU+8o1XTsMGQ8rbHJwVKlwIuyrxLr45MF1R43MtK6jO7i1DIYop:vUx4TXGtHFlwIvN05MF1Tj4i1DMp
                                          TLSH:6FE4124223F84720E5BE5BBC68B551610773752A3476EB4E1FD861DA2FB3B00DA2136B
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.g..............0.................. ... ....@.. .......................`............@................................
                                          Icon Hash:71f06930924d0f0f
                                          Entrypoint:0x4b0b0a
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x670435D0 [Mon Oct 7 19:26:08 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb0ab80x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x1340.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xaeb100xaec0053a7721da278c4d013904ffa5a7aca50False0.9291174892703863data7.903574933359164IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xb20000x13400x140077e9a854ffbc155c2a37d90a064087acFalse0.7453125data6.915452560417603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xb40000xc0x200fc6727401350e6cd9f14ae1c5da2b377False0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xb20c80xf1aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8706673564407656
                                          RT_GROUP_ICON0xb2ff40x14data1.05
                                          RT_VERSION0xb30180x324data0.43034825870646765
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 8, 2024 09:05:36.986718893 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:36.991792917 CEST8049703208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:36.992029905 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:36.992609024 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:36.997500896 CEST8049703208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:37.448484898 CEST8049703208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:37.500545979 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:38.253792048 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:38.258630037 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:38.259516001 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:38.956059933 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:38.956639051 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:38.961442947 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.106472015 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.107036114 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.112052917 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.256877899 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.265038967 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.270136118 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.415335894 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.415358067 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.415369987 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.415381908 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.415430069 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.415481091 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.632514000 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.667587042 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.672509909 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.818269968 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.832828045 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:39.837794065 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:39.982234955 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.013746977 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.018785954 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.166311979 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.166763067 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.171675920 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.322602987 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.332192898 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.337132931 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.486315966 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.491415024 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.496129036 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.666874886 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.671698093 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.676610947 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.822315931 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.823065042 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.823223114 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.823223114 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.823223114 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:40.827948093 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.828016043 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.828365088 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:40.828375101 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:41.204366922 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:41.266129971 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:41.596164942 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:41.601042986 CEST8049714208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:41.601130962 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:41.601363897 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:41.606163979 CEST8049714208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:42.059545040 CEST8049714208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:42.141021013 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:42.904867887 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:42.909737110 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:42.909861088 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:43.459475040 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:43.482281923 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:43.487665892 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:43.634427071 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:43.672095060 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:43.677542925 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:43.823745966 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:43.969147921 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:43.971226931 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.047972918 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.048024893 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.048810005 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.194993019 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.195008993 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.195020914 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.195031881 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.195075035 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.195108891 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.283487082 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.285310984 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.290147066 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.437006950 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.451525927 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.456448078 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.602745056 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.603693008 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.608620882 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.757556915 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.757988930 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.762895107 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.916913033 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:44.917329073 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:44.922244072 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.069919109 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.078023911 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.082866907 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.252346039 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.252649069 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.257529020 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.409490108 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.410738945 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.410738945 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.410767078 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.411169052 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:45.415587902 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.415600061 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.415730953 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.415945053 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:45.943300962 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:46.002948046 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:46.003015995 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:48.710082054 CEST4975980192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:48.714982033 CEST8049759208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:48.715075970 CEST4975980192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:48.715424061 CEST4975980192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:48.720185041 CEST8049759208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:49.307698011 CEST8049759208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:49.359826088 CEST4975980192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:50.554665089 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:50.559557915 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:50.559631109 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.121752977 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.122091055 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.126996040 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.275674105 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.276014090 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.280832052 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.429217100 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.432869911 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.437721968 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586508989 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586524963 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586535931 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586549044 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586558104 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.586673975 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.586673975 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.831466913 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.839519024 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:51.844346046 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:51.996965885 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.010677099 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.015536070 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.164490938 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.165150881 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.169894934 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.321716070 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.375463009 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.408664942 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.413516045 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.569191933 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.578851938 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.583688974 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.734436035 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.774533987 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.779450893 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.951318979 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:52.951594114 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:52.956438065 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.106390953 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.107546091 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:53.107623100 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:53.107623100 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:53.107646942 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:53.112643003 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.112682104 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.112694025 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.112705946 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.495871067 CEST58749766208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:53.547334909 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:57.460515976 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:57.465435028 CEST8049814208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:57.465555906 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:57.465842009 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:57.470925093 CEST8049814208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:57.931749105 CEST8049814208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:05:57.984808922 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:05:59.470340967 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:59.475217104 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:05:59.475291014 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:59.622479916 CEST49766587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:05:59.623122931 CEST4975980192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:00.023420095 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.023641109 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.028460026 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.174598932 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.174848080 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.179691076 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.326050997 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.330692053 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.335665941 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482381105 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482393980 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482417107 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482428074 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482436895 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.482487917 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.482568979 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.570821047 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.577060938 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.581917048 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.729408979 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.745356083 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.750336885 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.896162033 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:00.899461985 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:00.904282093 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.052623987 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.053253889 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.057998896 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.209738970 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.215512037 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.220352888 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.369013071 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.369333029 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.374114990 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.542599916 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.542912006 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.547688961 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.694866896 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.695661068 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.695729017 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.695760965 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.695800066 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:01.700531960 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.700544119 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.700603962 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:01.700896978 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:02.071592093 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:06:02.125464916 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:06:28.250833988 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:28.256840944 CEST8049703208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:06:28.256962061 CEST4970380192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:28.505026102 CEST8049814208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:06:28.505187035 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:32.910300970 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:32.916313887 CEST8049714208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:06:32.916397095 CEST4971480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:49.488372087 CEST4981480192.168.2.7208.95.112.1
                                          Oct 8, 2024 09:06:49.493614912 CEST8049814208.95.112.1192.168.2.7
                                          Oct 8, 2024 09:07:18.266652107 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:18.271576881 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:18.415889978 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:18.416250944 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:18.416333914 CEST58749705208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:18.416336060 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:18.416380882 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:18.419171095 CEST49705587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:22.922956944 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:22.927782059 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:23.075378895 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:23.076144934 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:23.076191902 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:23.076339960 CEST58749720208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:23.076383114 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:23.079317093 CEST49720587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:39.501251936 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:39.506499052 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:39.653397083 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:39.653776884 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:39.653989077 CEST58749826208.91.198.143192.168.2.7
                                          Oct 8, 2024 09:07:39.654314041 CEST49826587192.168.2.7208.91.198.143
                                          Oct 8, 2024 09:07:39.656872034 CEST49826587192.168.2.7208.91.198.143
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 8, 2024 09:05:36.948837042 CEST5310553192.168.2.71.1.1.1
                                          Oct 8, 2024 09:05:36.955878019 CEST53531051.1.1.1192.168.2.7
                                          Oct 8, 2024 09:05:38.244112968 CEST5877753192.168.2.71.1.1.1
                                          Oct 8, 2024 09:05:38.252986908 CEST53587771.1.1.1192.168.2.7
                                          Oct 8, 2024 09:05:57.443944931 CEST6209353192.168.2.71.1.1.1
                                          Oct 8, 2024 09:05:57.450669050 CEST53620931.1.1.1192.168.2.7
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 8, 2024 09:05:36.948837042 CEST192.168.2.71.1.1.10xc6d8Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:38.244112968 CEST192.168.2.71.1.1.10xa557Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:57.443944931 CEST192.168.2.71.1.1.10xb21cStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 8, 2024 09:05:36.955878019 CEST1.1.1.1192.168.2.70xc6d8No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:38.252986908 CEST1.1.1.1192.168.2.70xa557No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:38.252986908 CEST1.1.1.1192.168.2.70xa557No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:38.252986908 CEST1.1.1.1192.168.2.70xa557No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:38.252986908 CEST1.1.1.1192.168.2.70xa557No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                          Oct 8, 2024 09:05:57.450669050 CEST1.1.1.1192.168.2.70xb21cNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                          • ip-api.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.749703208.95.112.1807836C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 8, 2024 09:05:36.992609024 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Oct 8, 2024 09:05:37.448484898 CEST175INHTTP/1.1 200 OK
                                          Date: Tue, 08 Oct 2024 07:05:37 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 6
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 60
                                          X-Rl: 44
                                          Data Raw: 66 61 6c 73 65 0a
                                          Data Ascii: false


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.749714208.95.112.1807092C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 8, 2024 09:05:41.601363897 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Oct 8, 2024 09:05:42.059545040 CEST175INHTTP/1.1 200 OK
                                          Date: Tue, 08 Oct 2024 07:05:41 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 6
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 55
                                          X-Rl: 43
                                          Data Raw: 66 61 6c 73 65 0a
                                          Data Ascii: false


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.749759208.95.112.1807744C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 8, 2024 09:05:48.715424061 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Oct 8, 2024 09:05:49.307698011 CEST175INHTTP/1.1 200 OK
                                          Date: Tue, 08 Oct 2024 07:05:48 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 6
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 48
                                          X-Rl: 42
                                          Data Raw: 66 61 6c 73 65 0a
                                          Data Ascii: false


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.749814208.95.112.1806524C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 8, 2024 09:05:57.465842009 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Oct 8, 2024 09:05:57.931749105 CEST175INHTTP/1.1 200 OK
                                          Date: Tue, 08 Oct 2024 07:05:57 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 6
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 39
                                          X-Rl: 41
                                          Data Raw: 66 61 6c 73 65 0a
                                          Data Ascii: false


                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Oct 8, 2024 09:05:38.956059933 CEST58749705208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Oct 8, 2024 09:05:38.956639051 CEST49705587192.168.2.7208.91.198.143EHLO 887849
                                          Oct 8, 2024 09:05:39.106472015 CEST58749705208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Oct 8, 2024 09:05:39.107036114 CEST49705587192.168.2.7208.91.198.143STARTTLS
                                          Oct 8, 2024 09:05:39.256877899 CEST58749705208.91.198.143192.168.2.7220 2.0.0 Ready to start TLS
                                          Oct 8, 2024 09:05:43.459475040 CEST58749720208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Oct 8, 2024 09:05:43.482281923 CEST49720587192.168.2.7208.91.198.143EHLO 887849
                                          Oct 8, 2024 09:05:43.634427071 CEST58749720208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Oct 8, 2024 09:05:43.672095060 CEST49720587192.168.2.7208.91.198.143STARTTLS
                                          Oct 8, 2024 09:05:43.823745966 CEST58749720208.91.198.143192.168.2.7220 2.0.0 Ready to start TLS
                                          Oct 8, 2024 09:05:44.047972918 CEST58749720208.91.198.143192.168.2.7220 2.0.0 Ready to start TLS
                                          Oct 8, 2024 09:05:51.121752977 CEST58749766208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Oct 8, 2024 09:05:51.122091055 CEST49766587192.168.2.7208.91.198.143EHLO 887849
                                          Oct 8, 2024 09:05:51.275674105 CEST58749766208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Oct 8, 2024 09:05:51.276014090 CEST49766587192.168.2.7208.91.198.143STARTTLS
                                          Oct 8, 2024 09:05:51.429217100 CEST58749766208.91.198.143192.168.2.7220 2.0.0 Ready to start TLS
                                          Oct 8, 2024 09:06:00.023420095 CEST58749826208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                          Oct 8, 2024 09:06:00.023641109 CEST49826587192.168.2.7208.91.198.143EHLO 887849
                                          Oct 8, 2024 09:06:00.174598932 CEST58749826208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                          250-PIPELINING
                                          250-SIZE 41648128
                                          250-VRFY
                                          250-ETRN
                                          250-STARTTLS
                                          250-AUTH PLAIN LOGIN
                                          250-AUTH=PLAIN LOGIN
                                          250-ENHANCEDSTATUSCODES
                                          250-8BITMIME
                                          250-DSN
                                          250 CHUNKING
                                          Oct 8, 2024 09:06:00.174848080 CEST49826587192.168.2.7208.91.198.143STARTTLS
                                          Oct 8, 2024 09:06:00.326050997 CEST58749826208.91.198.143192.168.2.7220 2.0.0 Ready to start TLS

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:03:05:33
                                          Start date:08/10/2024
                                          Path:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                                          Imagebase:0x550000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1325398884.000000000391C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:3
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                                          Imagebase:0xe90000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jHJQWf.exe"
                                          Imagebase:0xe90000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp8543.tmp"
                                          Imagebase:0x4d0000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x290000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:03:05:34
                                          Start date:08/10/2024
                                          Path:C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3n P13000996 pdf.exe"
                                          Imagebase:0xbf0000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2556274282.0000000002F9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2556274282.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2556274282.0000000002F77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Target ID:11
                                          Start time:03:05:36
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          Imagebase:0x9e0000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1379159388.0000000003DFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 47%, ReversingLabs
                                          • Detection: 59%, Virustotal, Browse
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:03:05:36
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          Imagebase:0x7ff7fb730000
                                          File size:496'640 bytes
                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:false

                                          Target ID:13
                                          Start time:03:05:38
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmp9457.tmp"
                                          Imagebase:0x4d0000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:14
                                          Start time:03:05:38
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:15
                                          Start time:03:05:39
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Roaming\jHJQWf.exe"
                                          Imagebase:0x1a0000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:16
                                          Start time:03:05:39
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\jHJQWf.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\jHJQWf.exe"
                                          Imagebase:0xc60000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.2556220086.0000000002EBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.2556220086.0000000002E86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.2556220086.0000000002E97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Target ID:17
                                          Start time:03:05:44
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                          Imagebase:0x490000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000002.1446850415.000000000381C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 47%, ReversingLabs
                                          • Detection: 59%, Virustotal, Browse
                                          Reputation:low
                                          Has exited:true

                                          Target ID:18
                                          Start time:03:05:46
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A0.tmp"
                                          Imagebase:0x4d0000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:19
                                          Start time:03:05:46
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:20
                                          Start time:03:05:46
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                          Imagebase:0xb70000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.1513664213.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.1513664213.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.1509756030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.1513664213.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:22
                                          Start time:04:21:40
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                          Imagebase:0xc90000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.1540482760.000000000417B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:23
                                          Start time:04:21:41
                                          Start date:08/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jHJQWf" /XML "C:\Users\user\AppData\Local\Temp\tmpD6A0.tmp"
                                          Imagebase:0x4d0000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:04:21:41
                                          Start date:08/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:25
                                          Start time:04:21:41
                                          Start date:08/10/2024
                                          Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                          Imagebase:0xdb0000
                                          File size:721'920 bytes
                                          MD5 hash:CD3A6F4E87632D933A99502E32A34B73
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000019.00000002.2556822159.000000000324C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000019.00000002.2556822159.0000000003227000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000019.00000002.2556822159.0000000003216000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13.2%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:184
                                            Total number of Limit Nodes:6
                                            execution_graph 35188 6c77143 35189 6c7714d 35188->35189 35191 6c76fbb 35188->35191 35190 6c7705f 35191->35190 35195 6c79a07 35191->35195 35212 6c799b0 35191->35212 35229 6c799c0 35191->35229 35196 6c799d0 35195->35196 35197 6c799fe 35196->35197 35246 6c7a78c 35196->35246 35251 6c79e00 35196->35251 35256 6c79fc3 35196->35256 35261 6c7a29a 35196->35261 35266 6c7a5db 35196->35266 35271 6c7a2fc 35196->35271 35275 6c7a03e 35196->35275 35286 6c7a7ff 35196->35286 35293 6c7a0b2 35196->35293 35298 6c7a155 35196->35298 35302 6c79ef6 35196->35302 35306 6c7a336 35196->35306 35311 6c7a708 35196->35311 35316 6c7a029 35196->35316 35197->35190 35213 6c799d8 35212->35213 35214 6c79fc3 2 API calls 35213->35214 35215 6c79e00 2 API calls 35213->35215 35216 6c7a78c 2 API calls 35213->35216 35217 6c7a029 2 API calls 35213->35217 35218 6c7a708 2 API calls 35213->35218 35219 6c7a336 2 API calls 35213->35219 35220 6c79ef6 2 API calls 35213->35220 35221 6c7a155 2 API calls 35213->35221 35222 6c7a0b2 2 API calls 35213->35222 35223 6c7a7ff 2 API calls 35213->35223 35224 6c7a03e 6 API calls 35213->35224 35225 6c799fe 35213->35225 35226 6c7a2fc 2 API calls 35213->35226 35227 6c7a5db 2 API calls 35213->35227 35228 6c7a29a 2 API calls 35213->35228 35214->35225 35215->35225 35216->35225 35217->35225 35218->35225 35219->35225 35220->35225 35221->35225 35222->35225 35223->35225 35224->35225 35225->35190 35226->35225 35227->35225 35228->35225 35230 6c799d8 35229->35230 35231 6c79fc3 2 API calls 35230->35231 35232 6c79e00 2 API calls 35230->35232 35233 6c7a78c 2 API calls 35230->35233 35234 6c7a029 2 API calls 35230->35234 35235 6c7a708 2 API calls 35230->35235 35236 6c7a336 2 API calls 35230->35236 35237 6c79ef6 2 API calls 35230->35237 35238 6c7a155 2 API calls 35230->35238 35239 6c7a0b2 2 API calls 35230->35239 35240 6c7a7ff 2 API calls 35230->35240 35241 6c7a03e 6 API calls 35230->35241 35242 6c799fe 35230->35242 35243 6c7a2fc 2 API calls 35230->35243 35244 6c7a5db 2 API calls 35230->35244 35245 6c7a29a 2 API calls 35230->35245 35231->35242 35232->35242 35233->35242 35234->35242 35235->35242 35236->35242 35237->35242 35238->35242 35239->35242 35240->35242 35241->35242 35242->35190 35243->35242 35244->35242 35245->35242 35247 6c7a69e 35246->35247 35247->35246 35248 6c7a892 35247->35248 35321 6c769e0 35247->35321 35325 6c769d8 35247->35325 35252 6c79e0b 35251->35252 35253 6c79f2c 35252->35253 35329 6c76b71 35252->35329 35333 6c76b78 35252->35333 35253->35197 35257 6c79fdd 35256->35257 35337 6c76270 35257->35337 35341 6c76268 35257->35341 35258 6c7a00a 35258->35197 35262 6c7a2bb 35261->35262 35263 6c7a592 35262->35263 35345 6c768f0 35262->35345 35349 6c768e8 35262->35349 35263->35197 35267 6c7a5e4 35266->35267 35269 6c768f0 WriteProcessMemory 35267->35269 35270 6c768e8 WriteProcessMemory 35267->35270 35268 6c7a736 35269->35268 35270->35268 35353 6c76750 35271->35353 35357 6c76758 35271->35357 35272 6c7a291 35276 6c79feb 35275->35276 35277 6c7a04b 35275->35277 35278 6c7a00a 35276->35278 35284 6c76270 ResumeThread 35276->35284 35285 6c76268 ResumeThread 35276->35285 35361 6c76828 35277->35361 35365 6c76830 35277->35365 35278->35197 35279 6c7a066 35279->35278 35282 6c768f0 WriteProcessMemory 35279->35282 35283 6c768e8 WriteProcessMemory 35279->35283 35282->35279 35283->35279 35284->35278 35285->35278 35291 6c769e0 ReadProcessMemory 35286->35291 35292 6c769d8 ReadProcessMemory 35286->35292 35287 6c7a892 35288 6c7a69e 35288->35287 35289 6c769e0 ReadProcessMemory 35288->35289 35290 6c769d8 ReadProcessMemory 35288->35290 35289->35288 35290->35288 35291->35288 35292->35288 35294 6c7a0d5 35293->35294 35296 6c768f0 WriteProcessMemory 35294->35296 35297 6c768e8 WriteProcessMemory 35294->35297 35295 6c79f54 35295->35197 35296->35295 35297->35295 35300 6c76750 Wow64SetThreadContext 35298->35300 35301 6c76758 Wow64SetThreadContext 35298->35301 35299 6c7a174 35300->35299 35301->35299 35304 6c76b71 CreateProcessA 35302->35304 35305 6c76b78 CreateProcessA 35302->35305 35303 6c79f2c 35303->35197 35304->35303 35305->35303 35307 6c7a2fb 35306->35307 35308 6c7a291 35306->35308 35309 6c76750 Wow64SetThreadContext 35307->35309 35310 6c76758 Wow64SetThreadContext 35307->35310 35309->35308 35310->35308 35312 6c7a712 35311->35312 35314 6c768f0 WriteProcessMemory 35312->35314 35315 6c768e8 WriteProcessMemory 35312->35315 35313 6c7a736 35314->35313 35315->35313 35317 6c79fde 35316->35317 35318 6c7a00a 35317->35318 35319 6c76270 ResumeThread 35317->35319 35320 6c76268 ResumeThread 35317->35320 35318->35197 35319->35318 35320->35318 35322 6c76a2b ReadProcessMemory 35321->35322 35324 6c76a6f 35322->35324 35324->35247 35326 6c769e0 ReadProcessMemory 35325->35326 35328 6c76a6f 35326->35328 35328->35247 35330 6c76c01 CreateProcessA 35329->35330 35332 6c76dc3 35330->35332 35332->35332 35334 6c76c01 CreateProcessA 35333->35334 35336 6c76dc3 35334->35336 35336->35336 35338 6c762b0 ResumeThread 35337->35338 35340 6c762e1 35338->35340 35340->35258 35342 6c762b0 ResumeThread 35341->35342 35344 6c762e1 35342->35344 35344->35258 35346 6c76938 WriteProcessMemory 35345->35346 35348 6c7698f 35346->35348 35348->35262 35350 6c768f0 WriteProcessMemory 35349->35350 35352 6c7698f 35350->35352 35352->35262 35354 6c7679d Wow64SetThreadContext 35353->35354 35356 6c767e5 35354->35356 35356->35272 35358 6c7679d Wow64SetThreadContext 35357->35358 35360 6c767e5 35358->35360 35360->35272 35362 6c76870 VirtualAllocEx 35361->35362 35364 6c768ad 35362->35364 35364->35279 35366 6c76870 VirtualAllocEx 35365->35366 35368 6c768ad 35366->35368 35368->35279 35369 26f4668 35370 26f467a 35369->35370 35371 26f4686 35370->35371 35373 26f4778 35370->35373 35374 26f477c 35373->35374 35378 26f4878 35374->35378 35382 26f4888 35374->35382 35380 26f487c 35378->35380 35379 26f498c 35379->35379 35380->35379 35386 26f44e4 35380->35386 35384 26f488c 35382->35384 35383 26f498c 35383->35383 35384->35383 35385 26f44e4 CreateActCtxA 35384->35385 35385->35383 35387 26f5918 CreateActCtxA 35386->35387 35389 26f59db 35387->35389 35389->35389 35397 26fd3d8 35398 26fd3dc 35397->35398 35402 26fd5a8 35398->35402 35406 26fd5b8 35398->35406 35399 26fd50b 35403 26fd5ac 35402->35403 35409 26fb730 35403->35409 35407 26fb730 DuplicateHandle 35406->35407 35408 26fd5e6 35407->35408 35408->35399 35410 26fd620 DuplicateHandle 35409->35410 35412 26fd5e6 35410->35412 35412->35399 35390 6c7ab68 35391 6c7ab8e 35390->35391 35392 6c7acf3 35390->35392 35391->35392 35394 6c75024 35391->35394 35395 6c7ade8 PostMessageW 35394->35395 35396 6c7ae54 35395->35396 35396->35391 35413 26fac50 35414 26fac5f 35413->35414 35417 26fad48 35413->35417 35422 26fad37 35413->35422 35418 26fad59 35417->35418 35419 26fad7c 35417->35419 35418->35419 35420 26faf80 GetModuleHandleW 35418->35420 35419->35414 35421 26fafad 35420->35421 35421->35414 35423 26fad3c 35422->35423 35424 26fad7c 35423->35424 35425 26faf80 GetModuleHandleW 35423->35425 35424->35414 35426 26fafad 35425->35426 35426->35414
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b7a3f608860dd95665b482f099de24f84851860620e6ead795c9f21e02f3db2
                                            • Instruction ID: af63d97aeabe52c2ece119968e8b8adacdc6e31bc589944c33b9190db7998d8a
                                            • Opcode Fuzzy Hash: 2b7a3f608860dd95665b482f099de24f84851860620e6ead795c9f21e02f3db2
                                            • Instruction Fuzzy Hash: BE826C74A00A0ADFCB15CF68E984AAEBBF2FF98311F15C569E4059B3A1D730E941CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5e53432cf1fb93395b1759d371d4d6b97424328f9dcfed7b58268c96ee728eeb
                                            • Instruction ID: f9dd316dfda6c40c9e5d5f5fea918e98c35a04296a9d95ba70f1a37589dcd648
                                            • Opcode Fuzzy Hash: 5e53432cf1fb93395b1759d371d4d6b97424328f9dcfed7b58268c96ee728eeb
                                            • Instruction Fuzzy Hash: 0E229D70A002199FDB14DF69E854BAEBBB6FF88311F548569E806DB390DF349C42CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4dbe30452facb1a583cb9887bdbe557ea6448db3294e87f36b6eb937b94d9f2f
                                            • Instruction ID: 41f8efacce119eeb64906a00d370fcad10dd78b4e6d38ad0985e6f85090c9192
                                            • Opcode Fuzzy Hash: 4dbe30452facb1a583cb9887bdbe557ea6448db3294e87f36b6eb937b94d9f2f
                                            • Instruction Fuzzy Hash: 63D14A71A00119DFDB14CFA9E984AEDBBB2BF88321F95C069E405AB361D731E941DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb724a68964ebe52b7854924ab292a256bb7801b737c9b360447c6b561396050
                                            • Instruction ID: f23db1d9ea269f28bce4a64f2b01e492f5e916fcdd616c2551368cc44e265f48
                                            • Opcode Fuzzy Hash: fb724a68964ebe52b7854924ab292a256bb7801b737c9b360447c6b561396050
                                            • Instruction Fuzzy Hash: 842109B1D056588BEB18CF67D8443EEBFF2AFC9300F18C06AD409A6265DB7009458B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c7add913821121f69805f91ec98ca873e351aca00595aa1c6a225568a197329d
                                            • Instruction ID: 1fabcd54aaa80771c65a6268fd74ee7e7cdd4f2a33da3f01fda6ca5361c85844
                                            • Opcode Fuzzy Hash: c7add913821121f69805f91ec98ca873e351aca00595aa1c6a225568a197329d
                                            • Instruction Fuzzy Hash: 0D1107B1D046188BEB18CF6BD9443DEFAF7AFC8300F08C06A9409B6264DB7005458F90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e2acc2c2ec2207592f4ec32c2fd4f9b34c5d3f15c621948826cd8eee7c78f4c
                                            • Instruction ID: f6924e0a97cd0cf80335fbe302adf652ca7f9c883523e20a12d5b0729df7536a
                                            • Opcode Fuzzy Hash: 3e2acc2c2ec2207592f4ec32c2fd4f9b34c5d3f15c621948826cd8eee7c78f4c
                                            • Instruction Fuzzy Hash: F1B01200D9F7878DE3D22B3238002B9EB3C5657010B4574438045B31132C108401139C

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 85786a0-8578719 6 8578721-8578727 0->6 31 857872a call 85788d6 6->31 32 857872a call 8578918 6->32 7 8578730-85788cc call 857239c 31->7 32->7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %*&/)(#$^@!~-_$0,Wq
                                            • API String ID: 0-1692081166
                                            • Opcode ID: afcfacd7cd293b75d56b8fe4fdba3e6e9b41c35bfedac2304412c8e0564cb206
                                            • Instruction ID: e5a576d9298582718d4c4e002e4c96196130f3432ebe71f19a5be8b6d2273bca
                                            • Opcode Fuzzy Hash: afcfacd7cd293b75d56b8fe4fdba3e6e9b41c35bfedac2304412c8e0564cb206
                                            • Instruction Fuzzy Hash: D3517E35F102149BE704AF68D8456ADBBB3FF89300F1588ADD895AB385CF316D4ACB85

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 33 85786b0-8578727 64 857872a call 85788d6 33->64 65 857872a call 8578918 33->65 40 8578730-85788cc call 857239c 64->40 65->40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %*&/)(#$^@!~-_$0,Wq
                                            • API String ID: 0-1692081166
                                            • Opcode ID: 1be4e359bb3edcfc6c130aad3907bcc546cef461c1f44a175116ab4160a168b1
                                            • Instruction ID: ec839344cfbd3e2722e6ba3c27734186f16c0f7809d1fca4847068546bb4b9de
                                            • Opcode Fuzzy Hash: 1be4e359bb3edcfc6c130aad3907bcc546cef461c1f44a175116ab4160a168b1
                                            • Instruction Fuzzy Hash: 74516D31F102549BE704AB68D8456ADBBB3FF89300F1588ADE8956B385CF31694AC785

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 66 6c76b71-6c76c0d 68 6c76c46-6c76c66 66->68 69 6c76c0f-6c76c19 66->69 76 6c76c9f-6c76cce 68->76 77 6c76c68-6c76c72 68->77 69->68 70 6c76c1b-6c76c1d 69->70 72 6c76c40-6c76c43 70->72 73 6c76c1f-6c76c29 70->73 72->68 74 6c76c2d-6c76c3c 73->74 75 6c76c2b 73->75 74->74 78 6c76c3e 74->78 75->74 83 6c76d07-6c76dc1 CreateProcessA 76->83 84 6c76cd0-6c76cda 76->84 77->76 79 6c76c74-6c76c76 77->79 78->72 81 6c76c99-6c76c9c 79->81 82 6c76c78-6c76c82 79->82 81->76 85 6c76c86-6c76c95 82->85 86 6c76c84 82->86 97 6c76dc3-6c76dc9 83->97 98 6c76dca-6c76e50 83->98 84->83 87 6c76cdc-6c76cde 84->87 85->85 88 6c76c97 85->88 86->85 89 6c76d01-6c76d04 87->89 90 6c76ce0-6c76cea 87->90 88->81 89->83 92 6c76cee-6c76cfd 90->92 93 6c76cec 90->93 92->92 94 6c76cff 92->94 93->92 94->89 97->98 108 6c76e52-6c76e56 98->108 109 6c76e60-6c76e64 98->109 108->109 112 6c76e58 108->112 110 6c76e66-6c76e6a 109->110 111 6c76e74-6c76e78 109->111 110->111 113 6c76e6c 110->113 114 6c76e7a-6c76e7e 111->114 115 6c76e88-6c76e8c 111->115 112->109 113->111 114->115 116 6c76e80 114->116 117 6c76e9e-6c76ea5 115->117 118 6c76e8e-6c76e94 115->118 116->115 119 6c76ea7-6c76eb6 117->119 120 6c76ebc 117->120 118->117 119->120 121 6c76ebd 120->121 121->121
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C76DAE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: e44d3ea870786d794a0dfab20e324fe5715093b2c193bdbfd37359821587800f
                                            • Instruction ID: c174838a6034a8ae2e835be36c40b771b48a7d1856f99a1f27c4de91d584ea59
                                            • Opcode Fuzzy Hash: e44d3ea870786d794a0dfab20e324fe5715093b2c193bdbfd37359821587800f
                                            • Instruction Fuzzy Hash: 44915871D006198FEF64DF69CC44BEDBBB2EF48310F1485AAE809A7240DB759A85CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 123 6c76b78-6c76c0d 125 6c76c46-6c76c66 123->125 126 6c76c0f-6c76c19 123->126 133 6c76c9f-6c76cce 125->133 134 6c76c68-6c76c72 125->134 126->125 127 6c76c1b-6c76c1d 126->127 129 6c76c40-6c76c43 127->129 130 6c76c1f-6c76c29 127->130 129->125 131 6c76c2d-6c76c3c 130->131 132 6c76c2b 130->132 131->131 135 6c76c3e 131->135 132->131 140 6c76d07-6c76dc1 CreateProcessA 133->140 141 6c76cd0-6c76cda 133->141 134->133 136 6c76c74-6c76c76 134->136 135->129 138 6c76c99-6c76c9c 136->138 139 6c76c78-6c76c82 136->139 138->133 142 6c76c86-6c76c95 139->142 143 6c76c84 139->143 154 6c76dc3-6c76dc9 140->154 155 6c76dca-6c76e50 140->155 141->140 144 6c76cdc-6c76cde 141->144 142->142 145 6c76c97 142->145 143->142 146 6c76d01-6c76d04 144->146 147 6c76ce0-6c76cea 144->147 145->138 146->140 149 6c76cee-6c76cfd 147->149 150 6c76cec 147->150 149->149 151 6c76cff 149->151 150->149 151->146 154->155 165 6c76e52-6c76e56 155->165 166 6c76e60-6c76e64 155->166 165->166 169 6c76e58 165->169 167 6c76e66-6c76e6a 166->167 168 6c76e74-6c76e78 166->168 167->168 170 6c76e6c 167->170 171 6c76e7a-6c76e7e 168->171 172 6c76e88-6c76e8c 168->172 169->166 170->168 171->172 173 6c76e80 171->173 174 6c76e9e-6c76ea5 172->174 175 6c76e8e-6c76e94 172->175 173->172 176 6c76ea7-6c76eb6 174->176 177 6c76ebc 174->177 175->174 176->177 178 6c76ebd 177->178 178->178
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06C76DAE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 9817318cec16282630624c41ea85142b5852d628a3e9ada7202107e4c6af2183
                                            • Instruction ID: 79ded95206fec82b0d8731887149d8d33c4dc2d9d69da4cafbe0ccadc55f5517
                                            • Opcode Fuzzy Hash: 9817318cec16282630624c41ea85142b5852d628a3e9ada7202107e4c6af2183
                                            • Instruction Fuzzy Hash: B5915971D006198FEF64DF6ACC44BADBAB2FF48300F1485A9E808A7240DB759A85CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 180 26fad48-26fad57 181 26fad59-26fad66 call 26fa0a0 180->181 182 26fad83-26fad87 180->182 189 26fad7c 181->189 190 26fad68 181->190 183 26fad9b-26faddc 182->183 184 26fad89-26fad93 182->184 191 26fadde-26fade6 183->191 192 26fade9-26fadf7 183->192 184->183 189->182 239 26fad6e call 26fafe0 190->239 240 26fad6e call 26fafd0 190->240 191->192 194 26fae1b-26fae1d 192->194 195 26fadf9-26fadfe 192->195 193 26fad74-26fad76 193->189 196 26faeb8-26faf32 193->196 197 26fae20-26fae27 194->197 198 26fae09 195->198 199 26fae00-26fae07 call 26fa0ac 195->199 230 26faf38-26faf3b 196->230 231 26faf34-26faf36 196->231 201 26fae29-26fae31 197->201 202 26fae34-26fae3b 197->202 200 26fae0b-26fae19 198->200 199->200 200->197 201->202 204 26fae3d-26fae45 202->204 205 26fae48-26fae4a call 26fa0bc 202->205 204->205 209 26fae4f-26fae51 205->209 211 26fae5e-26fae63 209->211 212 26fae53-26fae5b 209->212 213 26fae65-26fae6c 211->213 214 26fae81-26fae8e 211->214 212->211 213->214 216 26fae6e-26fae7e call 26fa0cc call 26fa0dc 213->216 220 26faeb1-26faeb7 214->220 221 26fae90-26faeae 214->221 216->214 221->220 233 26faf3c-26faf78 230->233 231->230 231->233 234 26faf7a-26faf7d 233->234 235 26faf80-26fafab GetModuleHandleW 233->235 234->235 236 26fafad-26fafb3 235->236 237 26fafb4-26fafc8 235->237 236->237 239->193 240->193
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 026FAF9E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: e2ce14feaabba47e6156176fb893031c247056f3f2a8f2eddc589c9967ea9b78
                                            • Instruction ID: d70bee8288ed997f06f06afbfafaaf58f10f8fb15d9c6ddaca937d51d1d66b03
                                            • Opcode Fuzzy Hash: e2ce14feaabba47e6156176fb893031c247056f3f2a8f2eddc589c9967ea9b78
                                            • Instruction Fuzzy Hash: 26813670A00B058FDB64DF69D44075ABBF2BF88304F00892DD58ADBB50EB75A805CB95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 241 26f590d-26f590e 242 26f5914-26f5916 241->242 243 26f5910-26f5912 241->243 244 26f5918-26f591b 242->244 245 26f591c-26f59d9 CreateActCtxA 242->245 243->242 243->244 244->245 247 26f59db-26f59e1 245->247 248 26f59e2-26f5a3c 245->248 247->248 255 26f5a3e-26f5a41 248->255 256 26f5a4b-26f5a4f 248->256 255->256 257 26f5a51-26f5a5d 256->257 258 26f5a60 256->258 257->258 260 26f5a61 258->260 260->260
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 026F59C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 7510ae5911cb24c5fdc2e1f134319bc91c2cf710c8263f9f07d95207d452cde0
                                            • Instruction ID: 3b3feb962dd38bb73110fa5b72db928082a63eee2c2973d6549390a2694465f5
                                            • Opcode Fuzzy Hash: 7510ae5911cb24c5fdc2e1f134319bc91c2cf710c8263f9f07d95207d452cde0
                                            • Instruction Fuzzy Hash: 6141E171C00719CBEF28CFAAC884B8DBBB5BF49714F60805AD509AB251DB75694ACF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 261 26f44e4-26f59d9 CreateActCtxA 265 26f59db-26f59e1 261->265 266 26f59e2-26f5a3c 261->266 265->266 273 26f5a3e-26f5a41 266->273 274 26f5a4b-26f5a4f 266->274 273->274 275 26f5a51-26f5a5d 274->275 276 26f5a60 274->276 275->276 278 26f5a61 276->278 278->278
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 026F59C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 36cbb99138b8cc6f846a48a540b7609c1da485baafb090872bf26fa7bbc7b204
                                            • Instruction ID: ab88ef41423b6bbb6d572be18c220d7dbd52e9330bcc14155613bb2047d59926
                                            • Opcode Fuzzy Hash: 36cbb99138b8cc6f846a48a540b7609c1da485baafb090872bf26fa7bbc7b204
                                            • Instruction Fuzzy Hash: 5841D070C0071DCBEB28DFA9C884B9DBBB5FF49304F60805AD509AB251DB75694ACF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 279 26fd6e1-26fd6e8 280 26fd6ea 279->280 281 26fd6a4-26fd6b4 DuplicateHandle 279->281 284 26fd6ec-26fd6ee 280->284 285 26fd6f0-26fd6f3 280->285 282 26fd6bd-26fd6da 281->282 283 26fd6b6-26fd6bc 281->283 283->282 284->285 286 26fd6f4-26fd80e 284->286 285->286
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,026FD5E6,?,?,?,?,?), ref: 026FD6A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 0da8102233f1d73813566f663b47b0b768041678148f662a68da7ee1975eaae5
                                            • Instruction ID: 91fb98ddc2b4dbdd5a0fd8908f74cd10ecda29ca86812a3e5e828f3356780430
                                            • Opcode Fuzzy Hash: 0da8102233f1d73813566f663b47b0b768041678148f662a68da7ee1975eaae5
                                            • Instruction Fuzzy Hash: 9831A1346403898FE705EFA1E4587697BB1F7C8312F118569E9159B3D8EBB89C45CF20

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 300 6c768e8-6c7693e 303 6c76940-6c7694c 300->303 304 6c7694e-6c7698d WriteProcessMemory 300->304 303->304 306 6c76996-6c769c6 304->306 307 6c7698f-6c76995 304->307 307->306
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C76980
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 6c888853cfc7344523c20fc3d30d9c52b33c7c5c60a806c3e3bf0a590386e503
                                            • Instruction ID: 8e6bf5ede3b850440409e3e7945a53008313f8b080f3993154ca184b28978984
                                            • Opcode Fuzzy Hash: 6c888853cfc7344523c20fc3d30d9c52b33c7c5c60a806c3e3bf0a590386e503
                                            • Instruction Fuzzy Hash: 302135769003599FDB24CFAAC884BDEBBF5FF48310F10842AE958A7241D7789944CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 311 6c768f0-6c7693e 313 6c76940-6c7694c 311->313 314 6c7694e-6c7698d WriteProcessMemory 311->314 313->314 316 6c76996-6c769c6 314->316 317 6c7698f-6c76995 314->317 317->316
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06C76980
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: b760bb10881201b0ab6fd38323ef52f2a6c56770536bda758dc4cb4845f9bd77
                                            • Instruction ID: 0743c9a82d3e0c8797da11057c651694ad0c6d81c35a361ea65c636661ff218f
                                            • Opcode Fuzzy Hash: b760bb10881201b0ab6fd38323ef52f2a6c56770536bda758dc4cb4845f9bd77
                                            • Instruction Fuzzy Hash: 00212775D003499FDB10CFAAC884BDEBBF5FF48310F10842AE959A7240D7799954CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 328 6c76750-6c767a3 330 6c767a5-6c767b1 328->330 331 6c767b3-6c767e3 Wow64SetThreadContext 328->331 330->331 333 6c767e5-6c767eb 331->333 334 6c767ec-6c7681c 331->334 333->334
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C767D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: b163f6590d661b430141bb5226a868021e8039c7992ddeafce77912ae94c45da
                                            • Instruction ID: 54ab1c0adeee6f26a5e8fdeb2a37b1c1ca7f81116d7738c4ec00af1654ec066d
                                            • Opcode Fuzzy Hash: b163f6590d661b430141bb5226a868021e8039c7992ddeafce77912ae94c45da
                                            • Instruction Fuzzy Hash: 0F214875D003489FDB14DFAAC484BEEBBF4AF88320F14842ED459A7241CB789945CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 338 6c769d8-6c76a6d ReadProcessMemory 342 6c76a76-6c76aa6 338->342 343 6c76a6f-6c76a75 338->343 343->342
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C76A60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 9aa6b944dec97dc11ab41d8bf633ec60aa2d343a151935f39a41ade73f4d89fe
                                            • Instruction ID: edf946acf64e9cfa2fea8e02b9ca859777fa5604218a2dea8225bc1fc70eb4a9
                                            • Opcode Fuzzy Hash: 9aa6b944dec97dc11ab41d8bf633ec60aa2d343a151935f39a41ade73f4d89fe
                                            • Instruction Fuzzy Hash: 92212771C003599FDB10CFAAC880BEEBBF5FF48310F10842AE918A7250D7789940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 321 26fb730-26fd6b4 DuplicateHandle 324 26fd6bd-26fd6da 321->324 325 26fd6b6-26fd6bc 321->325 325->324
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,026FD5E6,?,?,?,?,?), ref: 026FD6A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: c5061513030e90ec8ddb05506a6f66fc08d747584fa1fe68b8a2540d55151da8
                                            • Instruction ID: 60b716474bb429d40fa648b3a6c8f1746d1d16f30327a12ee37ecd6936aa162b
                                            • Opcode Fuzzy Hash: c5061513030e90ec8ddb05506a6f66fc08d747584fa1fe68b8a2540d55151da8
                                            • Instruction Fuzzy Hash: 8C21E4B5D002489FDF10CFAAD984ADEFBF5EB48310F24841AE918A7350D378A954CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 347 26fd619-26fd61e 348 26fd624-26fd6b4 DuplicateHandle 347->348 349 26fd620-26fd623 347->349 350 26fd6bd-26fd6da 348->350 351 26fd6b6-26fd6bc 348->351 349->348 351->350
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,026FD5E6,?,?,?,?,?), ref: 026FD6A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 5230bde299ac2907b4a5f17a86888801daabb66c3a5053a75e1110b0ee70cd4f
                                            • Instruction ID: 7c71ce1e0ec04b58fd6e08d16fcc58dfb3fd7fa1a4a1ca577cfef86f1f549212
                                            • Opcode Fuzzy Hash: 5230bde299ac2907b4a5f17a86888801daabb66c3a5053a75e1110b0ee70cd4f
                                            • Instruction Fuzzy Hash: 5521E4B5D002489FDF10CFAAD984ADEBBF5EB48324F24841AE918A7350D378A944CF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 354 6c76758-6c767a3 356 6c767a5-6c767b1 354->356 357 6c767b3-6c767e3 Wow64SetThreadContext 354->357 356->357 359 6c767e5-6c767eb 357->359 360 6c767ec-6c7681c 357->360 359->360
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06C767D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: cfec1df1099239a46546b539f4819ee8bd0583da13e81996555bf6e5ed44bec6
                                            • Instruction ID: 613ea97f2a92971aac37b4d7d2f93ee18ee0ff6fece79f69a2049b5ecb8f7b48
                                            • Opcode Fuzzy Hash: cfec1df1099239a46546b539f4819ee8bd0583da13e81996555bf6e5ed44bec6
                                            • Instruction Fuzzy Hash: D4212575D003088FDB14DFAAC485BAEBBF5EF88320F14842AD419A7240DB789944CFA4
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06C76A60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 6699a5b04511c982a93ef97d9affab628c67522b91213492815ae2ed9471d670
                                            • Instruction ID: e5a8c8b22ccd9be25509d52dd0fea623ebadb93f27e444878fb5a07873e3161f
                                            • Opcode Fuzzy Hash: 6699a5b04511c982a93ef97d9affab628c67522b91213492815ae2ed9471d670
                                            • Instruction Fuzzy Hash: CA2116B1C003599FDB10DFAAC840BEEBBF5FF48320F10842AE918A7240D7799940CBA5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C7AE45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 969a78bc3ef3fc38c6b2d27f3be12575a8b7d6be315aeb1570e64481b6e692ec
                                            • Instruction ID: 549bc5a9305745a91776911bd8a90aae227268755dd4a89d5a03943d69238f2b
                                            • Opcode Fuzzy Hash: 969a78bc3ef3fc38c6b2d27f3be12575a8b7d6be315aeb1570e64481b6e692ec
                                            • Instruction Fuzzy Hash: C02113B68003489FDB20DF99D844BDEFBF4EB88320F20841AD558A7611C379A954CFA5
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C7689E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 1ff0d3a6d8bcfb4115a5f656a32b9862a87cc0f206b88f4971ba142b6f60133a
                                            • Instruction ID: 349c4485d94f3719e4caddcc240bc38e56e008b61b6cf72854533f12880d261f
                                            • Opcode Fuzzy Hash: 1ff0d3a6d8bcfb4115a5f656a32b9862a87cc0f206b88f4971ba142b6f60133a
                                            • Instruction Fuzzy Hash: B11136769002489FDB20DFAAD844BDEBBF1AF88320F14841AD919A7250C6799944CFA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: c7bafe71a16c855c17d795f1814fd0be3b699a7be3224abcfa27caeae3b803da
                                            • Instruction ID: 918f04cff3f059ef064842c5da64fdd2a679c6ca846ad2315afa9ce3d850ca78
                                            • Opcode Fuzzy Hash: c7bafe71a16c855c17d795f1814fd0be3b699a7be3224abcfa27caeae3b803da
                                            • Instruction Fuzzy Hash: 9E1126B5D002488FDB24DFAAD445BDEBBF5AF88320F24881EC459A7240DB799945CFA4
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06C7689E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 06c3eec53d4cb71fab946c6de4c5a223af13f6cc781493d77258b568dd762404
                                            • Instruction ID: c6bb8da4f70ec2c3d36a1de7af24e136ac6badcf50717a83075bfb4afcd49699
                                            • Opcode Fuzzy Hash: 06c3eec53d4cb71fab946c6de4c5a223af13f6cc781493d77258b568dd762404
                                            • Instruction Fuzzy Hash: EA1129759003489FDB24DFAAC844BDEBBF5EF88310F14841AD919A7250C7799544CFA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: e758da2328f047704a7d243e80c09426acdf2a908bcde80a30a4cf43b5a90340
                                            • Instruction ID: 25849f8f6f4fc354614782f2e2da92fea0b340c1bc6fa4e31889d5c597a7907c
                                            • Opcode Fuzzy Hash: e758da2328f047704a7d243e80c09426acdf2a908bcde80a30a4cf43b5a90340
                                            • Instruction Fuzzy Hash: 191128B1D003488FDB24DFAAC845BDEFBF5EF88320F14841AD519A7240CB79A944CBA4
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06C7AE45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 1077b142875db62214318505b3d0f23b26b8054204c404fa80767d693f2e8f4d
                                            • Instruction ID: 549396fa9f74375761a8067004637f899b445d2b39fde23a2bdaff8d8716f06a
                                            • Opcode Fuzzy Hash: 1077b142875db62214318505b3d0f23b26b8054204c404fa80767d693f2e8f4d
                                            • Instruction Fuzzy Hash: 2F1103B580034D9FDB20DF9AD845BDEBBF8EB48320F10841AE958A7610D379A954CFA5
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 026FAF9E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: d5b1ae62a1abded330b0f87ee3c6039933e93500d7ae4b4f02cf8ffd6e5a0180
                                            • Instruction ID: dacf1cb7e2abca8f1599c149ca59e5133aa8be6dee69f9715e43d361921767fc
                                            • Opcode Fuzzy Hash: d5b1ae62a1abded330b0f87ee3c6039933e93500d7ae4b4f02cf8ffd6e5a0180
                                            • Instruction Fuzzy Hash: 4B1110B6C002498FDB20CF9AD544BDEFBF5EB88224F10841AD918A7610D379A545CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7e8f055f1455ca5fc4be97be7dd385e8c1f2d0190ab5ad2082bdcbe26e588b3
                                            • Instruction ID: 9931556c790f49c743d9fe81708f4bf894a42b27e3bc081f6251d8e51d5dd0d7
                                            • Opcode Fuzzy Hash: e7e8f055f1455ca5fc4be97be7dd385e8c1f2d0190ab5ad2082bdcbe26e588b3
                                            • Instruction Fuzzy Hash: 09127D30A00208CFCB24DF69E984A9EBBF5FF88315F548559E8199B361DB35ED42CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6bd44d95668739ce01abdf66ab9fc26c1db038f9efe08d0bdb8e70b60d4ac598
                                            • Instruction ID: 2a1e122ac3a27f77142b7c49b56d20a65f402f169dc62c82f238603555e22b12
                                            • Opcode Fuzzy Hash: 6bd44d95668739ce01abdf66ab9fc26c1db038f9efe08d0bdb8e70b60d4ac598
                                            • Instruction Fuzzy Hash: 0BF10B75A00619CFCB04DF69E598AADBBF6FF8C311B1681A9E415AB361CB30EC41CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16a1b9de3c326cf539b994ce1d1fcc1e740acf2176510a78f5b15b36bca50fe9
                                            • Instruction ID: 5079ccf19e34aa6c557a12cd43412a855d61ebf994573eeb0d2b99438814ff3c
                                            • Opcode Fuzzy Hash: 16a1b9de3c326cf539b994ce1d1fcc1e740acf2176510a78f5b15b36bca50fe9
                                            • Instruction Fuzzy Hash: 85F13730A0061ADFDB11CF95E580DAEBBF6FF88301B16C569E955AB291C734E851CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3119c622e4eee6b3ea4760d8ec3e36d8cabe349651c6fff22efbcd1debe9c222
                                            • Instruction ID: f00f9d9c933bf0ba46a310c4cc03f7123faf6679c0f8639d5ff732752535e3f6
                                            • Opcode Fuzzy Hash: 3119c622e4eee6b3ea4760d8ec3e36d8cabe349651c6fff22efbcd1debe9c222
                                            • Instruction Fuzzy Hash: 45C1E030600605CFC710CF68D984B6ABBBAFF85311F54C5AAE919DB391E731E912CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a738c863e22537fcffd698a0d717cf2861276d9b73ffac580442d0c995961d8
                                            • Instruction ID: d06744674b08e9a6d368d40e97b9bdee7e83501c095254f7cc1ccb78f0dd34fe
                                            • Opcode Fuzzy Hash: 1a738c863e22537fcffd698a0d717cf2861276d9b73ffac580442d0c995961d8
                                            • Instruction Fuzzy Hash: 4BB18B347042548FEB159F39E958B2A7BA7BB88312F14896DE806CB390DF35C846CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6db8c734103273c53dd233c5dd71758db056ec33aa880db991dbe0c95c4dce09
                                            • Instruction ID: 9048dafaf79ddb209a4f745717659fa8f87ad8a1e236f5cea67c1df3044c78f2
                                            • Opcode Fuzzy Hash: 6db8c734103273c53dd233c5dd71758db056ec33aa880db991dbe0c95c4dce09
                                            • Instruction Fuzzy Hash: 04B15F343206518FEB259B29E854B3D7AA6FF85603F18846EE103CF3A5FA69DC42C751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e0dbc76e30610232222c13426b5ca3d7be332da2cb7c10255d2d8f095b17db4
                                            • Instruction ID: a078e4ae4cd0309ee01969ca99dfd1f0f49d25ba78063492844dfadd4b75c45e
                                            • Opcode Fuzzy Hash: 9e0dbc76e30610232222c13426b5ca3d7be332da2cb7c10255d2d8f095b17db4
                                            • Instruction Fuzzy Hash: A6C15830A00209DFCB14CF69E984A9EBBF6BF88315F54C559E819AB361D735EC42CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 48ef816cc3da3b032009bd797e04c2f96a5afebf4f3a15f96bfa6fc93330e832
                                            • Instruction ID: e4f0909f0c851f1c9b31924f0baccf89e60ac4d1ff4148c7b49cf84f19fc0e2a
                                            • Opcode Fuzzy Hash: 48ef816cc3da3b032009bd797e04c2f96a5afebf4f3a15f96bfa6fc93330e832
                                            • Instruction Fuzzy Hash: 9C818034B00605CFDB14CF69E888A6AB7B2FF89216F14C569D50BDB365DB31E842CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2334037dff0c84c8022841908365e227acfd9c9875e8ee162899feba47174188
                                            • Instruction ID: f8923f165718ca48ebe4126736f033c3c4a10fee969eb2fb1408f9ee1f416dd6
                                            • Opcode Fuzzy Hash: 2334037dff0c84c8022841908365e227acfd9c9875e8ee162899feba47174188
                                            • Instruction Fuzzy Hash: 23712734710205CFCB15DF68E894A6E7BE5BF49212F1980A9E80ACB3B1DB70DC81CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4237c31c62a462bb166f11d127e90979c44b626207d30b5d3477bffa2e02f06
                                            • Instruction ID: 62920a57cef1d3837382fe421832813286a4eab23b98c54028e93a6323044160
                                            • Opcode Fuzzy Hash: b4237c31c62a462bb166f11d127e90979c44b626207d30b5d3477bffa2e02f06
                                            • Instruction Fuzzy Hash: 6F51E574F04645DFEB04DFA9E440BBEBAB2BB84312F10C566E556A73C0CB359D428B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a09ab1f1b028c56dfe56c0c8e4b93cd56207172645310167d2be75d1baad96f
                                            • Instruction ID: bfe3dbe8033f09800076a222738481674329db4eeee4a35638f18d6425250482
                                            • Opcode Fuzzy Hash: 0a09ab1f1b028c56dfe56c0c8e4b93cd56207172645310167d2be75d1baad96f
                                            • Instruction Fuzzy Hash: E0615D70E00749DFDF15CFA9E5406ADBBF2BF8A301F24C259E815AB241D770A945CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 26a078f2d1a1ed81e5426cf87b56c38333b07dd1767e5baf600b0e85b31b016e
                                            • Instruction ID: 7e67e05e5c6d6dc814e83619e68884fb0aaf42683b7b79d76450c0fd6d2a9252
                                            • Opcode Fuzzy Hash: 26a078f2d1a1ed81e5426cf87b56c38333b07dd1767e5baf600b0e85b31b016e
                                            • Instruction Fuzzy Hash: 49518F35B006158FDB15EFB9A84896EBBFBFFC5221B148569E419DB390EB309C068790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fadbffa717a7c0945cc930b30bf91e682633bc174416a79d20daa2abeacd0be8
                                            • Instruction ID: c9ec83d715a1e76a136b4d75c480f9ebc0ccd4324798d6b6310b00c564875c0c
                                            • Opcode Fuzzy Hash: fadbffa717a7c0945cc930b30bf91e682633bc174416a79d20daa2abeacd0be8
                                            • Instruction Fuzzy Hash: A3513970E00749DFDF15CFA9D5406ADBBF2BF8A301F24C65AE845AB241E770A985CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7a5431734a192ce8381e488b2d0aabd7345502cfebc3f0771534df1028efe63a
                                            • Instruction ID: c80ce280652884d87b1c7ebe7703b2591d9d6af0b363e845229c7c1c8502ccd8
                                            • Opcode Fuzzy Hash: 7a5431734a192ce8381e488b2d0aabd7345502cfebc3f0771534df1028efe63a
                                            • Instruction Fuzzy Hash: 6541AC35A00659DFCF11CFA4E884A9DBFF2FF95312F008159E805AB291D731E811CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3ef3a273e83993fde574ddabeaa38e62362bc1c542c5dc14a6499adfb3605ed0
                                            • Instruction ID: 1c8d39c2766869d445d0abdb7cd3943adc448d667bd7c9d3669c99866a846b74
                                            • Opcode Fuzzy Hash: 3ef3a273e83993fde574ddabeaa38e62362bc1c542c5dc14a6499adfb3605ed0
                                            • Instruction Fuzzy Hash: 4F41B0B0D15608DFDB14DFA0D19865EBBB2FF80301F14C1AAC4259F361D7359A46CB8A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c9eae9e5d6c5701abe13cde551e3d643979da3cdfcb0dbf3c5fd184d6fdbbc5
                                            • Instruction ID: 6c1333054b0a533265b9b02c667ef5886ddde4218777b64b9be84e1f6497d28b
                                            • Opcode Fuzzy Hash: 0c9eae9e5d6c5701abe13cde551e3d643979da3cdfcb0dbf3c5fd184d6fdbbc5
                                            • Instruction Fuzzy Hash: 1F31E7217183808FE7015774B8193697FF2AB86222F0588FBE456CB7D6CD288C46C76A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5feb6d02a400afef79fb7efb14e1cd552da70bdb14c32ed000565dbb33794aee
                                            • Instruction ID: 0fd2e0257d3b4ec6a4203f83414a6e369410e571f35fe21ec3f0242f57fa139b
                                            • Opcode Fuzzy Hash: 5feb6d02a400afef79fb7efb14e1cd552da70bdb14c32ed000565dbb33794aee
                                            • Instruction Fuzzy Hash: 0F31B470714310CFDB269B25E89467D77A5FB81702B2888AEE015CB292FB66CC8187D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8080eec88d290259557b18dd841ecb580e1dffb53bc71d25f1b976f7f2ad2a2
                                            • Instruction ID: f88e60c8dfae6d8156d10e35dfecd9ffd800ca3869466aceabb3f920af6dba86
                                            • Opcode Fuzzy Hash: c8080eec88d290259557b18dd841ecb580e1dffb53bc71d25f1b976f7f2ad2a2
                                            • Instruction Fuzzy Hash: C931823560464AAFCF059F64F885AAE3BB6FB89306F408058F91687354CF34C962CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cdb2cd70dfe6130f4913f7c6aa039735c11e6c44c97ee126b0055b2b8e303a99
                                            • Instruction ID: bc9f3132ec1f79cce1a492f20f25ce4720dc4ca134f74bc0dd8f7d6483b7e287
                                            • Opcode Fuzzy Hash: cdb2cd70dfe6130f4913f7c6aa039735c11e6c44c97ee126b0055b2b8e303a99
                                            • Instruction Fuzzy Hash: E33159759002099FDB14DFA9D844ADEBFF9FB48320F14846AE808E7310D775A905CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e62d64e9357906f9aadeae4c6de410f3dd8581f8ad56b0d18c4e3ac6dee67ebb
                                            • Instruction ID: 52091c998b832fce7ae3a08cb7358f5b6ae7a77ab810623f26686f8e1935d97a
                                            • Opcode Fuzzy Hash: e62d64e9357906f9aadeae4c6de410f3dd8581f8ad56b0d18c4e3ac6dee67ebb
                                            • Instruction Fuzzy Hash: C431A274E04209CFCB44CFE4D4849ADBBB5FF49315F20946AE919AB365CB31A946CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7eb21c96ba0cd0931154c87cb53fc1a0360fbc2ee455314eb424e8e776a53bad
                                            • Instruction ID: 6c2011d7b895de98d4791ff626580db46dc830d74994d01c34d026ed38261782
                                            • Opcode Fuzzy Hash: 7eb21c96ba0cd0931154c87cb53fc1a0360fbc2ee455314eb424e8e776a53bad
                                            • Instruction Fuzzy Hash: 8231B0709062A9CFCB14CF69E4806BEBBF1FF85202F54C5AAD49AE7249D734D941CB21
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b56bc808855bcfc342a89f3971c9c3168dda1c96c6f6cba273cca1b64e695fdd
                                            • Instruction ID: 00eb5f55817f0e9679892331ebadb366d33b7d10cc90392d726632f70a95b703
                                            • Opcode Fuzzy Hash: b56bc808855bcfc342a89f3971c9c3168dda1c96c6f6cba273cca1b64e695fdd
                                            • Instruction Fuzzy Hash: 6A21C2353002108BEB24273AE85463E769BBFC5607F14C07DD506CB394EE29CC839759
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e4be8111790f5e5d0aec3f67f8481e35fb8921c38f2a0a42d3cb061a276b53d
                                            • Instruction ID: c58fed8b999d047fecce252ef10892c7ee3d466660fae2a1a9924404009187c7
                                            • Opcode Fuzzy Hash: 9e4be8111790f5e5d0aec3f67f8481e35fb8921c38f2a0a42d3cb061a276b53d
                                            • Instruction Fuzzy Hash: F421CF353103108BDB24273EE85463D7A9BBFC5617B14C47ED506CB394EE28C843AB89
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c983338216753160c48d8ed8afc808a4d640321410b99ebb67b4217c0d6a5c3c
                                            • Instruction ID: b15a734c0c94a1c33d95e914f9f5616805201375e16b9e2c23fba0833a7c3bdc
                                            • Opcode Fuzzy Hash: c983338216753160c48d8ed8afc808a4d640321410b99ebb67b4217c0d6a5c3c
                                            • Instruction Fuzzy Hash: 2421D3317143008FE7049BB8B91D72E7AE6BB85222F1089BAE517C77C5DE358C42C75A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 728235c0b5bdb6daa9119f0ea91dcb6758ee05842d79d5f6d5803080a6eb30b8
                                            • Instruction ID: 57924dc88937c4951b40df6436eae66a0cbce351eb3686e007bbd99ab3469920
                                            • Opcode Fuzzy Hash: 728235c0b5bdb6daa9119f0ea91dcb6758ee05842d79d5f6d5803080a6eb30b8
                                            • Instruction Fuzzy Hash: F9317171A006158FDB04DF6CE8849AEBBB6FF8D311B15C269E4169B3A1CB34DC52CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ab84a6769106db391b3d570fdb846bca6dc6ad694d69cdb9e71c5dfed00b4f6
                                            • Instruction ID: a01cff7bc55ef06e95aaab24bd4634359eccf09603113bed163bc750168eff98
                                            • Opcode Fuzzy Hash: 1ab84a6769106db391b3d570fdb846bca6dc6ad694d69cdb9e71c5dfed00b4f6
                                            • Instruction Fuzzy Hash: A231C130A09744CBDB208FA9E84067EB7B0FF45612F04C97BE956C7A89C33AD846C661
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 350b60ee03a3f1d05e50dc6515e7d23e298bb8bf0efdab52cb14bb624811c48b
                                            • Instruction ID: 3df39b065ed2c5294aa93dfec2fac1181b88e9133b9d8b4eaa51fc6f5c51b2f1
                                            • Opcode Fuzzy Hash: 350b60ee03a3f1d05e50dc6515e7d23e298bb8bf0efdab52cb14bb624811c48b
                                            • Instruction Fuzzy Hash: BD21FFB2500240EFDF19EF14D9C0B26BB69FB88328F20C579E8090B256C736D456CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 50885c1d2ee9f8dfc96e165f17afd5d7f92ffea5a9a99b1f62de5c44e23e4077
                                            • Instruction ID: b7d20d80568915cfd917e705496430e888bc29a1f183ea6b7f0b48fdc9660669
                                            • Opcode Fuzzy Hash: 50885c1d2ee9f8dfc96e165f17afd5d7f92ffea5a9a99b1f62de5c44e23e4077
                                            • Instruction Fuzzy Hash: AD210371500204DFDF18EF14D9C0B2ABB69FB89724F20C579E90A0F256C73AE456CAA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d00a8b4c96784ae704a28a11eab849bc6bc5812cd548ec5269b1a7e9fc4508c9
                                            • Instruction ID: 4d97cf6ab8423c1226196a2ce8cd2eefd2b76a2ca02fcdb9fc79c5342340a4d2
                                            • Opcode Fuzzy Hash: d00a8b4c96784ae704a28a11eab849bc6bc5812cd548ec5269b1a7e9fc4508c9
                                            • Instruction Fuzzy Hash: 2521F3307007119BE7259A69E49892E7796BF89752B1480ACE81BDB394CF21DC428B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324430363.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26ad000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8f2d79c7ccca5b25a88a224257b3d6aafedfd507feebcefa1e4d147c088f1f6
                                            • Instruction ID: fbc797cafa5820b002f4aafbe66827096691ac3f83ddd390d0b2ebaf508c3c34
                                            • Opcode Fuzzy Hash: d8f2d79c7ccca5b25a88a224257b3d6aafedfd507feebcefa1e4d147c088f1f6
                                            • Instruction Fuzzy Hash: C021F271604384DFDB18DF24D9D1B16BBA5EB88314F20C56DD84A4BB96C33AD847CE62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324430363.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26ad000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e1edf08942fcea5f47fe177381604cb39d6c9353198cda41222419690f17993
                                            • Instruction ID: 7cc8d2048af104872d56805775e3ca069a9ceca0c1c99b390bea8cf127b753bd
                                            • Opcode Fuzzy Hash: 3e1edf08942fcea5f47fe177381604cb39d6c9353198cda41222419690f17993
                                            • Instruction Fuzzy Hash: 2821D071504204AFDB15DF50D9D0B26BBA5FB88314F20C5ADEA0A4BB92C33AD846CE61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35b2fda81f51ab8bb992a51ccca5c0847db08845ad3b3c6d110494c03b0bc500
                                            • Instruction ID: 9d6bc68c1be556d29637ffa22a46bf26c6c510adb793ba9dff053b6d7b0f37ea
                                            • Opcode Fuzzy Hash: 35b2fda81f51ab8bb992a51ccca5c0847db08845ad3b3c6d110494c03b0bc500
                                            • Instruction Fuzzy Hash: 4D213A30B04304CFE7149A7DA844B2E3AB7FBC8211B10857ED50AE7385DF388C0687A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 653f63fd3abc70ecee8b408d800830093cf5282f2e65b78ebdd54a94353d5e81
                                            • Instruction ID: d1ae8d69a905c245984c137afba31b71149e8afad4c5aeea59327c76acecf15a
                                            • Opcode Fuzzy Hash: 653f63fd3abc70ecee8b408d800830093cf5282f2e65b78ebdd54a94353d5e81
                                            • Instruction Fuzzy Hash: E02105356446499FCB049F64F485B6E3BA6FB86316F4480A8F8068B384CB34CD92CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 23fe19c3704cceb7cb16d815fc044f6d2cd5d0ad097a9648302888371366e378
                                            • Instruction ID: b47dab4f83be59d78b7aaa5decebb4a0ec304dff89a18ed1793819cb2a2118a0
                                            • Opcode Fuzzy Hash: 23fe19c3704cceb7cb16d815fc044f6d2cd5d0ad097a9648302888371366e378
                                            • Instruction Fuzzy Hash: 6911E730B04300DFE7109A79AC44A6A7FB7FBC9212F10857ED506E7285DB3889058766
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c06b5e96c185990c55bb46859d2620c28cef326d3c6863ff03a062a477306b3f
                                            • Instruction ID: 1810828a9017539ad012710d47f8e1a9ae296e9c2c74498614181341b67dc78a
                                            • Opcode Fuzzy Hash: c06b5e96c185990c55bb46859d2620c28cef326d3c6863ff03a062a477306b3f
                                            • Instruction Fuzzy Hash: 0C31D1B0D01258DFDB21DFA9D584BCEBBF1BB48311F24841AE404BB250C7B55845CF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 99f480b2b8e6d06451474ea3ef1a00415b746f2c13113d0d2655af96dbd59275
                                            • Instruction ID: 16db59bb165941d7109b2d9e6ab9422eee453fa57fc694fa6bb5a8ffe34fa6f1
                                            • Opcode Fuzzy Hash: 99f480b2b8e6d06451474ea3ef1a00415b746f2c13113d0d2655af96dbd59275
                                            • Instruction Fuzzy Hash: 0C212170A09259CBD7548FADE8802BAF7B1FF45302F40863BE516E7289D370A845C792
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3dfd5585e2b02dd5b1a78253f376aa2b63d539a94cb21a735f99a69d2b71115
                                            • Instruction ID: 0b7b6e81177d4c66957af0b8d84955bb2c1dfbe1df1a778b94b4705a5411df22
                                            • Opcode Fuzzy Hash: e3dfd5585e2b02dd5b1a78253f376aa2b63d539a94cb21a735f99a69d2b71115
                                            • Instruction Fuzzy Hash: 4C217A74E01249DFEF04DFA5E544AEEBFB6BF89301F2480A9E411A6250EB309942DF60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91289bdfff1d77303f8ffe1ceb972cbf8fa0645ade48898b7e08f8ae69e03342
                                            • Instruction ID: f034cfe0fa8598079700cd55286da856fa5cb7099038cf812d5660793fa425d7
                                            • Opcode Fuzzy Hash: 91289bdfff1d77303f8ffe1ceb972cbf8fa0645ade48898b7e08f8ae69e03342
                                            • Instruction Fuzzy Hash: 3C21DCB5E05615CBDB508FA8E8C03BEF3B1FF40202F04863AE615EA28AD374A955C795
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74729c4f8be190083cb80ae0cfd05aeade00fae92e4b2fc6af36957e93a04ba5
                                            • Instruction ID: 4d3a147abf1b72bd7999f2d3217a921e89bc72c68281dc6ecc56a91cd1a8b13b
                                            • Opcode Fuzzy Hash: 74729c4f8be190083cb80ae0cfd05aeade00fae92e4b2fc6af36957e93a04ba5
                                            • Instruction Fuzzy Hash: 3721D0B0D01258DFEB21DF9AD588B8EBFF6BB48315F24841AE404BB250C7B95845CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324430363.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26ad000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2101055edf99aabed077b802af17533c0c2f55abe3324edd3bae27a8c32d09ee
                                            • Instruction ID: 3a014c4cd25483de80f71d84164e694d2e8da8e7eb2ba82f438e4dd7d6f49856
                                            • Opcode Fuzzy Hash: 2101055edf99aabed077b802af17533c0c2f55abe3324edd3bae27a8c32d09ee
                                            • Instruction Fuzzy Hash: 572150755083C09FCB12CF14D994B11BF71EB46314F28C5DAD8498F6A7C33A9856CB62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 963001a3f2cd0512f225ead463f6a9d8471c3f8de6fcff4c298b27a64b64b32b
                                            • Instruction ID: 489c3bf333fbd41231b1768aa813700c41ddad55d16f3c9eb1eec3eaa2478403
                                            • Opcode Fuzzy Hash: 963001a3f2cd0512f225ead463f6a9d8471c3f8de6fcff4c298b27a64b64b32b
                                            • Instruction Fuzzy Hash: D3116A71B002198BCF25EBB8A810ABEB7F6BB89311B108079C505F7244EB368D02CB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 910894ac745fcb0e71a0c3d728ca58ab900bbc91eeb70cffaa7c9a5e4276c9f7
                                            • Instruction ID: d6123f6d379acddcb2d8d29a80315aedec49a79491153ab96c2c03a8c1eccc3a
                                            • Opcode Fuzzy Hash: 910894ac745fcb0e71a0c3d728ca58ab900bbc91eeb70cffaa7c9a5e4276c9f7
                                            • Instruction Fuzzy Hash: 1E1106357007118FE7259E69F498A2D77A6FF85752B1985BCE807DB390CF21DC028B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 148e20e5cf9b90d1fcb0e3c5da104385edb77cc8c05c9c0f54c3afca42a5b1f8
                                            • Instruction ID: 1e5a8cb49feeebf343fc63982cfa992599c92f28ef900c16e0444fcd632a7f11
                                            • Opcode Fuzzy Hash: 148e20e5cf9b90d1fcb0e3c5da104385edb77cc8c05c9c0f54c3afca42a5b1f8
                                            • Instruction Fuzzy Hash: A111C675A006159BDB11DE799844ABFB7FBFBC4261B14852DE815D3340EF309D068B64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ba0e517f5714b03305c2c7bdcf13e8094b50760d1a4b6d38b6c3997ed3e623c
                                            • Instruction ID: 8471a45f4f6b322fb9197735e1b93e664fb495416c2705344053bb2870dbb088
                                            • Opcode Fuzzy Hash: 1ba0e517f5714b03305c2c7bdcf13e8094b50760d1a4b6d38b6c3997ed3e623c
                                            • Instruction Fuzzy Hash: 1A116D35B10204EBDB14DF65E845A9EBBBAFF8C311F108069F916A7390DA31AC51CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 44df4f30263bcdc10e5856553e37680c6e8b2c5837f1718ae87b646c1f752a3a
                                            • Instruction ID: 8acfd4e6a496f89238984a0bab13bac7ba1e6296cad35e3805276232f351ba85
                                            • Opcode Fuzzy Hash: 44df4f30263bcdc10e5856553e37680c6e8b2c5837f1718ae87b646c1f752a3a
                                            • Instruction Fuzzy Hash: 7C110230B42240DFE7244A25E804B2977A3FFC5706F55C46EE006DF29AD9A5D8428791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction ID: 909bdf03d7f197f59818441a0900e7b7f52f006937530d8ce7ab2f38195d697d
                                            • Opcode Fuzzy Hash: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction Fuzzy Hash: 2611B176504280DFCF15DF10D5C4B16BF71FB84328F24C6A9D8494B656C336D456CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction ID: bb91e14bc4b0773377af14b58fbaa01e05807caf7c667a2ee29f79ec04841f17
                                            • Opcode Fuzzy Hash: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction Fuzzy Hash: E311DF72404240DFCF15DF00D5C0B16BF71FB85724F24C6A9D8090B656C33AE456CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f72d0c6407f49e4fc28c70f113d6c281dda1fed6bd7441e1645c3995778cb3fc
                                            • Instruction ID: cd83ddac736f66a0c846008461d854122da8ac1dd5ae0fc77caa7082e9e5f788
                                            • Opcode Fuzzy Hash: f72d0c6407f49e4fc28c70f113d6c281dda1fed6bd7441e1645c3995778cb3fc
                                            • Instruction Fuzzy Hash: 1921D6B590034D9FDB10CF9AD844BDEBBF5FB48320F10846AE919A7210D379A954CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324430363.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26ad000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: ece1643325d2abc2702e36194c89a098434df7a62b558dfff49e93f0d9112d8a
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: F4118B75504280DFCB15CF50D5D4B15BBA1FB84318F24C6AAD9494BBA6C33AD84ACF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2518c4a983a88204d4bc366c2ce998bd78c58585bebc304cfcd0a566d09ec3ca
                                            • Instruction ID: cbac71e001a72348b9faa85c6697f7b0196f1a49a1f4725a0f30d870387987d2
                                            • Opcode Fuzzy Hash: 2518c4a983a88204d4bc366c2ce998bd78c58585bebc304cfcd0a566d09ec3ca
                                            • Instruction Fuzzy Hash: C7012630B41240DFE7244A16E804B29B7A3FFC5707F11C42EE006DF299C9B5D8018791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f466bf6e63f100faf231a8195ebc2b057f6c7955e68c4b45c5005dd4eae501e
                                            • Instruction ID: de427599be86721e48b0838e6832b457a31a316b8e6cf4c4c82ae0b6e6564c44
                                            • Opcode Fuzzy Hash: 3f466bf6e63f100faf231a8195ebc2b057f6c7955e68c4b45c5005dd4eae501e
                                            • Instruction Fuzzy Hash: BB019AB1A05525CBEB548FACF4803B9F2B1FF44303F408626E626EA2C9D3B4A951C795
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5ce573b50cd2d2a53c563eb5fb926762399389ffcb6b65c43199832fc048e50
                                            • Instruction ID: 4337dd2386e192a6342a02a5be64e04c041ba5ece59a7c7f25550f61786f4a52
                                            • Opcode Fuzzy Hash: c5ce573b50cd2d2a53c563eb5fb926762399389ffcb6b65c43199832fc048e50
                                            • Instruction Fuzzy Hash: 1A01D6A170E264CFD3108A69EC8462ABFACFB45722F09CA77E515DE281D224C8418359
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b32c9c3075250f7cc760bc86c4a36a24a89a6d0213c3932c64f135a3c9afd85
                                            • Instruction ID: 755f12f3d0976627d70690f18fe7df77e44fecffb688f30baaa9ff41cac31abb
                                            • Opcode Fuzzy Hash: 7b32c9c3075250f7cc760bc86c4a36a24a89a6d0213c3932c64f135a3c9afd85
                                            • Instruction Fuzzy Hash: 88F0FF33A005096BCB019E59FC02BAF7BAAEBC8751F14C029F914D6280CB76C9129BA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e63bbecbe94f607f4482b0d8c6267d41db72f2d3c589c66ccd685c496a134762
                                            • Instruction ID: c551c18831c62684051f798bda68f19e25942ba832fd1d68be1a6de4aee79207
                                            • Opcode Fuzzy Hash: e63bbecbe94f607f4482b0d8c6267d41db72f2d3c589c66ccd685c496a134762
                                            • Instruction Fuzzy Hash: 8A01D132B001146B8F059E59B810AAF7BABEBC9751B14C069F905D7380CF79CC129BA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 376d42bccf2cd12bf345b7b7a4d0dfbadc6e23970f43f2804a7c64f50f9e7c88
                                            • Instruction ID: 3e197ff6b90a24613f104a9c45f3b74eb8972884e8333a2f38d9987ce88e1857
                                            • Opcode Fuzzy Hash: 376d42bccf2cd12bf345b7b7a4d0dfbadc6e23970f43f2804a7c64f50f9e7c88
                                            • Instruction Fuzzy Hash: 09011331A002199FCF08CF98D9448DEBBF9FF88311B00812AE905AB254DB71A919CBA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ddcc45a623dd115c8816d647cc77f2f4ecb333a6647a187d2eccc8751e115751
                                            • Instruction ID: eca1891c447dbcff5e73f8476aed7177f8ece042332a319de1e0aadcd5c14438
                                            • Opcode Fuzzy Hash: ddcc45a623dd115c8816d647cc77f2f4ecb333a6647a187d2eccc8751e115751
                                            • Instruction Fuzzy Hash: DA111730D0060DEFEB44EFA4C99169EBBB6FF88300F5085AAD415EB355EB355A068F85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ace9b63c327bac7f2b82a68bb9986e8d4040f442dca17eafb394e8b2e048c587
                                            • Instruction ID: 317c5eca07c2b8e2973df7de61617050ac1e229a49300fb5712a1347e9a6dd5a
                                            • Opcode Fuzzy Hash: ace9b63c327bac7f2b82a68bb9986e8d4040f442dca17eafb394e8b2e048c587
                                            • Instruction Fuzzy Hash: 0D01A771404344AEEF246A25CD84B66BBECDF41224F18852AED094E386DB7A9441CA76
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3932b13303b2623d6903631de958b6a8297ed51a09cbef007bc764cd3f5158fb
                                            • Instruction ID: 27c667a6dc3341145e3bf23a603123731378f2a369458d8bbe55e45d7e13d844
                                            • Opcode Fuzzy Hash: 3932b13303b2623d6903631de958b6a8297ed51a09cbef007bc764cd3f5158fb
                                            • Instruction Fuzzy Hash: 3501E974E0121ADFCB14DFA9D5809AEBBF2FF48301F118966E416EB341E634AD81CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dfb67cf5b84ee6ac1af82f1af3d984c262e44be2eedf36ccd063351fb6ab3868
                                            • Instruction ID: 033b317a6334e50d5af49399935587012ae19a181abda280b18fe38fe42ef6ff
                                            • Opcode Fuzzy Hash: dfb67cf5b84ee6ac1af82f1af3d984c262e44be2eedf36ccd063351fb6ab3868
                                            • Instruction Fuzzy Hash: DAF0903605F3E09FC72A8BA4B9586B53FB46B43112F0996CFD089AB463C6A14419D362
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5c648dd131bce353739a3a11c065d067d76ee04694f9ca9acd35f821319d2e9
                                            • Instruction ID: 5e007a51eb3ca6f1de414678c1b92cc38609b7dd82e1c72248e3ce5eb41f78f2
                                            • Opcode Fuzzy Hash: f5c648dd131bce353739a3a11c065d067d76ee04694f9ca9acd35f821319d2e9
                                            • Instruction Fuzzy Hash: 16F09076B046155FCB24CE19E444ABE77EAFBD8222F15C47AE015C7350D935D8418750
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 90887d249aaec11b4a584fb46152c400d64528506573b06fb1719c9e1add5c6a
                                            • Instruction ID: 6c04b28d85706c7fd297b9fbc4853339905353673c6c0aacd85c7ec095f6292a
                                            • Opcode Fuzzy Hash: 90887d249aaec11b4a584fb46152c400d64528506573b06fb1719c9e1add5c6a
                                            • Instruction Fuzzy Hash: 1D01E570D0030DEFEB44EFA4C591A9EBBB6FF48300F5085AAD115AB354EB355A019F89
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c51e045839f6974a7f28d271daa15b38fc00b2efde1ef413c9c19a7bf2045dc1
                                            • Instruction ID: 9018a5e515058810feda28f46a5a0376d06fd5d3e447cfb75bff20abf7fed82b
                                            • Opcode Fuzzy Hash: c51e045839f6974a7f28d271daa15b38fc00b2efde1ef413c9c19a7bf2045dc1
                                            • Instruction Fuzzy Hash: C1012171C04269DFEB15CF69E4447EE7BF1BF44321F24C65AE424AA291D3744985CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fb77e672be05f8b19078eedca8efc911ed765e102b26cc32fc109b9fb492fa7
                                            • Instruction ID: aa4f833f14ba9962ab2684d15ca6f1e7aadbbb3b31d735fafbe0d34bb977e0f6
                                            • Opcode Fuzzy Hash: 8fb77e672be05f8b19078eedca8efc911ed765e102b26cc32fc109b9fb492fa7
                                            • Instruction Fuzzy Hash: 2401E838A08348CFCB40CFA4D844AADBFB6FF4A301F109459D809AB755DB309801CF00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324370246.000000000269D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0269D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_269d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f8e425cae2a1c47f92c2e0f6b85f10d2b0e568a3ca44cc2a4928def467e2728
                                            • Instruction ID: ca2e84c28c0457e2426080d31f985dd16cee249763121bb62c117d6e42c715e2
                                            • Opcode Fuzzy Hash: 3f8e425cae2a1c47f92c2e0f6b85f10d2b0e568a3ca44cc2a4928def467e2728
                                            • Instruction Fuzzy Hash: C9F06272404344AEEB209A16DD84B62FFACEF41634F18C55AED084F386D779A844CAB5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0589bccd0a6d3bf83a2dab47ad44f227880449aae0047325e0e1b3114a153c3d
                                            • Instruction ID: 6d0fc66356f4736577e11fb53c5fa9f71e482ccc334942f39ace5c67544fd993
                                            • Opcode Fuzzy Hash: 0589bccd0a6d3bf83a2dab47ad44f227880449aae0047325e0e1b3114a153c3d
                                            • Instruction Fuzzy Hash: 6D01BB70D00229DFEB15DF6AE4047AEBAF5BF48351F14C629E424AA290D7744A85CFD0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a01b37c13ddd4b3089dc28874fd5a86d04f0577ef2917f8191f247e67bc35c23
                                            • Instruction ID: a09497a109e97f8c705acbc70db5e238c668e52154206ebc10a7ad2a19992df6
                                            • Opcode Fuzzy Hash: a01b37c13ddd4b3089dc28874fd5a86d04f0577ef2917f8191f247e67bc35c23
                                            • Instruction Fuzzy Hash: A1F030727046186F97049A6EDC84D6BB7EEFBCC671355817AF50DD7310D9319C0186A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d40628cf1faff80e96dc46add6f95968292c813ca4af143bfdbdece998870205
                                            • Instruction ID: d66a366197d3b13d2f0624215f85b8ec29c01d230e6033aaaf64b17bc63e3310
                                            • Opcode Fuzzy Hash: d40628cf1faff80e96dc46add6f95968292c813ca4af143bfdbdece998870205
                                            • Instruction Fuzzy Hash: 4DE039727042286FA3049A6AE884D6BBBEEEBCC670351807AF508C7310D931AC0086A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52940cc28c7f70f7817f065357ebae2ff012c570789942e2f71b311b4e76a881
                                            • Instruction ID: 7f47a580c05cc82869f45f32b37054f20743584593b2b61513647d37469c5936
                                            • Opcode Fuzzy Hash: 52940cc28c7f70f7817f065357ebae2ff012c570789942e2f71b311b4e76a881
                                            • Instruction Fuzzy Hash: CBF02771B093849FDB06CBB49C198AE3FF89F8210071884EBE905C7342F9349D06D322
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 64ac67253de7642e114fb8605926598a021df97a3f1674846e8890e221400e8c
                                            • Instruction ID: 40ecb955c9c015b35f6c2bd0c757c65131390bbb1add643142eb0797db90fa86
                                            • Opcode Fuzzy Hash: 64ac67253de7642e114fb8605926598a021df97a3f1674846e8890e221400e8c
                                            • Instruction Fuzzy Hash: B2F082B2A041096FDF46DF94E84199A7FBAAF44214B19C1EBE404E7361F7319A108755
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f3cdf48848ac95351ab3b19fbce5852dd09cab968ee037e39736a1f13244f369
                                            • Instruction ID: 02dca5497f93c4f4e50ef7a14130ca5d7c5e1e54e2142c2b7b5ec8f98e40a319
                                            • Opcode Fuzzy Hash: f3cdf48848ac95351ab3b19fbce5852dd09cab968ee037e39736a1f13244f369
                                            • Instruction Fuzzy Hash: 4EE0B636E08108CE8F00DA85E8808DDFB75FB85316F408056D92867211DA3054168FA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0ae5325d44d93063a91a8da08eee8ff75fa81c582fdf0f2223e825ee6b00c9c
                                            • Instruction ID: 5a2d8fc990df59bf7ccd43256f8bae90a43462117f14e725bf664b8d3ffb2255
                                            • Opcode Fuzzy Hash: a0ae5325d44d93063a91a8da08eee8ff75fa81c582fdf0f2223e825ee6b00c9c
                                            • Instruction Fuzzy Hash: C1D0A93280470507EA45FB30F843B0C33BEFBC0200F5081A0F8080E62AEF6C988A4AAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4542b79c7c5635b00a11a4dec8e3f850721e17074ab3db230dc8beb84569fc10
                                            • Instruction ID: 207df381d5f652c602d96359719836751eab102c513e3eca906d397e887368c3
                                            • Opcode Fuzzy Hash: 4542b79c7c5635b00a11a4dec8e3f850721e17074ab3db230dc8beb84569fc10
                                            • Instruction Fuzzy Hash: A4E0B638A08244CFC744CFA0D4448ACFB75FF4A305B11D99AE8066B326CB309842CF00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7e4ddf57040342210b277ccc04962a39bc6b0da3a996666b0ddf490fccf38a0
                                            • Instruction ID: fc59c17f32c0e912fd9e9fb383ccd04d5d0ecc63aa5d9c19795425e34250a507
                                            • Opcode Fuzzy Hash: d7e4ddf57040342210b277ccc04962a39bc6b0da3a996666b0ddf490fccf38a0
                                            • Instruction Fuzzy Hash: A4D05E32409390DFE7165B64AD2C6943F61EB12202F05518BE84CE2863C7640A58D772
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00fec8f70e153701f37820b9c186f2447f2d40d1e951d581d27d4b97c6dce004
                                            • Instruction ID: 3a288d1d468129e94d2aa5dd0b819e6a4a569fc98666467f2deb5ecb7378fb8c
                                            • Opcode Fuzzy Hash: 00fec8f70e153701f37820b9c186f2447f2d40d1e951d581d27d4b97c6dce004
                                            • Instruction Fuzzy Hash: F3D05238A43208CFEB20DF14EC50AD8BB79FF88221F0052E2E20CA3210EA301A85CE00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 809cdedc6163be40f144c11f448230a3978775c7ea98ca34cebe857f13b805b3
                                            • Instruction ID: faab734720a6b1c1dad129ec7057df0f049e5316ca2a000192a4761124329ebc
                                            • Opcode Fuzzy Hash: 809cdedc6163be40f144c11f448230a3978775c7ea98ca34cebe857f13b805b3
                                            • Instruction Fuzzy Hash: 0FC0123591070547D945FF61F845D1933BEAAC410075045A0B0050E62DEF7858454A99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 086b933863421f3e847a6f65d2f750a2e7ae4c7d8b3d46f8c61822a4c5012d2d
                                            • Instruction ID: c3c8341fffa0f6a4017b077a153cec9c7945f5ca39424cbd01ee81575b3295b0
                                            • Opcode Fuzzy Hash: 086b933863421f3e847a6f65d2f750a2e7ae4c7d8b3d46f8c61822a4c5012d2d
                                            • Instruction Fuzzy Hash: 45C08C31001304CFD22867A4BA0C3243AA8E701203F40601AE00D62422CBA04418EA36
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7a7ef47ec6e405b246add5fc5bc9da8fb5ae1da5ee94f62b1d6bd2b939ff6589
                                            • Instruction ID: 647e1207894b063b7c378ff4cc232d95ba4b18353fa4cedb781f615f3f6d90df
                                            • Opcode Fuzzy Hash: 7a7ef47ec6e405b246add5fc5bc9da8fb5ae1da5ee94f62b1d6bd2b939ff6589
                                            • Instruction Fuzzy Hash: 7FC012356DA0419BE71207F0DC663C077B0E306200FCC20B2CCD4B9715D31C84079B68
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c56907aaf48a1093f373aabdd909c6c9b46f98c7fbf9d018d0f1030b94bd78dd
                                            • Instruction ID: 66d651404a2d4744c33feee3ff6d3e51967ee2bcf3082b15c1c71f2e413d0379
                                            • Opcode Fuzzy Hash: c56907aaf48a1093f373aabdd909c6c9b46f98c7fbf9d018d0f1030b94bd78dd
                                            • Instruction Fuzzy Hash: 86C09B9615F3C10FF31757745C215962F3059B310938D52D3C3D457163D5185059E73B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 357a4fb6a1e72f284e245e10cb65350435affcd609ae8a01aa3404ef61f95b1d
                                            • Instruction ID: ef4fa3921da78d1bcac57363cd78a29f5f1605cf6bfcb10beefe8bb6396e1289
                                            • Opcode Fuzzy Hash: 357a4fb6a1e72f284e245e10cb65350435affcd609ae8a01aa3404ef61f95b1d
                                            • Instruction Fuzzy Hash: 2FD17C31B006098FDBA5EB75C460B6EB7FAAF89700F14446ED15ADB390DB35E902CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e686a2ba35fc8e03e0edf2d0866cd7f243e6e7c3732da1cd9c9b9c0dcf68e8aa
                                            • Instruction ID: 1539668c49742cc0dec609071425446421e49cd17e95f1551f4d7b4c609b1de1
                                            • Opcode Fuzzy Hash: e686a2ba35fc8e03e0edf2d0866cd7f243e6e7c3732da1cd9c9b9c0dcf68e8aa
                                            • Instruction Fuzzy Hash: 15E11B74E102598FDB14DFA9C580AAEFBF2FF89304F248169E415AB35AD7319941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79d3ca5af152111000b0046e8caddcdcc2e962d4cf4a58c984a0e9bba1ca214f
                                            • Instruction ID: a5fddf7a0aea99cb442c9b69c32635d7524c2eb9f7152ab0177eb31a86ea3302
                                            • Opcode Fuzzy Hash: 79d3ca5af152111000b0046e8caddcdcc2e962d4cf4a58c984a0e9bba1ca214f
                                            • Instruction Fuzzy Hash: D1E10974E102598FDB54DFA9C580AAEFBF2FF89304F248169E415AB356D730A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb77ff4592fad4b56b11568c5205e7416cc37daa3bd5335086703e194a061c45
                                            • Instruction ID: 2b04513b4fc18467703cd28760284c8508f8ae4a12d66b59dffa257f755bafb4
                                            • Opcode Fuzzy Hash: fb77ff4592fad4b56b11568c5205e7416cc37daa3bd5335086703e194a061c45
                                            • Instruction Fuzzy Hash: A0E10C74E002598FDB14DFA9C584AAEFBF2FF89304F648169E415AB355DB30A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cca1a92cafcc2b3044a1a332081bf1ddd4b78e50c88a8324b36eb346c58152dc
                                            • Instruction ID: 11fde64f5f4561ffc1caed55e46310ee85257aee1e9aeaf392c1423a23c33af1
                                            • Opcode Fuzzy Hash: cca1a92cafcc2b3044a1a332081bf1ddd4b78e50c88a8324b36eb346c58152dc
                                            • Instruction Fuzzy Hash: 91E12A74E006598FDB54DFA9C5809AEFBF2FF89304F248169E415AB35AD730A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee3302d1c56ebba6aacd24e965ac8ef864e2ce8b418c94f44cafed25d7c2d675
                                            • Instruction ID: 8835e3c4dd7345cf871becdaa57f49c17e0a483a997e3cbd01eaad0ff55bb5b4
                                            • Opcode Fuzzy Hash: ee3302d1c56ebba6aacd24e965ac8ef864e2ce8b418c94f44cafed25d7c2d675
                                            • Instruction Fuzzy Hash: 0FE13C74E102598FDB14DF99C580AAEFBF2FF89300F248169E419AB359D730A941DFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4ee90a3d5ca1f5436e17dee1eb3810ff48a349c116654c21e8ccb2902f49dea3
                                            • Instruction ID: 054be17d33c114cec7a6564749e7d4bfdbe2faef48ddb187dd38098ad9134537
                                            • Opcode Fuzzy Hash: 4ee90a3d5ca1f5436e17dee1eb3810ff48a349c116654c21e8ccb2902f49dea3
                                            • Instruction Fuzzy Hash: 8ED1F435D10A5ACACB10EF64D950AD9B7B1FF95300F20979AD1093B611FB70AAC9CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1330869784.0000000008570000.00000040.00000800.00020000.00000000.sdmp, Offset: 08570000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_8570000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e47c7b568328c978433aa71075284e649920988104cbce98c99c1c07832d365d
                                            • Instruction ID: 7ef30092b810350c11dc4712b7316d1315a89003dfde96b87524cc2d4cc11a6f
                                            • Opcode Fuzzy Hash: e47c7b568328c978433aa71075284e649920988104cbce98c99c1c07832d365d
                                            • Instruction Fuzzy Hash: A2D1F435D10A5ACACB10EF64D950AD9B7B1FF95300F20979AD1093B611FB706AC9CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1324648272.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_26f0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d95d2379910c6a6116df0fc8f77f21e8dc0f5f8701821e724f435182d552334
                                            • Instruction ID: cd984e329be86dd55620456391daa7d0708723e40360e686864239e0be2d9e1c
                                            • Opcode Fuzzy Hash: 1d95d2379910c6a6116df0fc8f77f21e8dc0f5f8701821e724f435182d552334
                                            • Instruction Fuzzy Hash: 3CA18E36E002098FCF15DFB4D89099EB7B2FF85304B1541AAEA01AB7A5DB75E906CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1328099322.0000000006C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6c70000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc27812677ac169cd5b069f6b6419caac6ed826eba6f57b60d317eee2f18a81e
                                            • Instruction ID: 73e2f60fdce23f3724dff8f9a2ad755bb7314f6479915881cce37649b656a229
                                            • Opcode Fuzzy Hash: cc27812677ac169cd5b069f6b6419caac6ed826eba6f57b60d317eee2f18a81e
                                            • Instruction Fuzzy Hash: 71513E74E006198FDB14DFAAC5905AEFBF2FF89304F248169D418AB356D7309942CFA1

                                            Execution Graph

                                            Execution Coverage:11%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:11.1%
                                            Total number of Nodes:27
                                            Total number of Limit Nodes:4
                                            execution_graph 26070 14d0848 26072 14d084e 26070->26072 26071 14d091b 26072->26071 26074 14d1380 26072->26074 26076 14d1383 26074->26076 26075 14d14ba 26075->26072 26076->26075 26078 14d8610 26076->26078 26079 14d861a 26078->26079 26080 14d8634 26079->26080 26083 6b3b2fb 26079->26083 26088 6b3b308 26079->26088 26080->26076 26085 6b3b31d 26083->26085 26084 6b3b532 26084->26080 26085->26084 26086 6b3b960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26085->26086 26087 6b3b928 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26085->26087 26086->26085 26087->26085 26090 6b3b31d 26088->26090 26089 6b3b532 26089->26080 26090->26089 26091 6b3b960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26090->26091 26092 6b3b928 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26090->26092 26091->26090 26092->26090 26093 14d8438 26094 14d847e DeleteFileW 26093->26094 26096 14d84b7 26094->26096 26097 14d70b8 26098 14d70fc CheckRemoteDebuggerPresent 26097->26098 26099 14d713e 26098->26099 26100 14df030 DuplicateHandle 26101 14df0c6 26100->26101

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 875 14d70b8-14d713c CheckRemoteDebuggerPresent 877 14d713e-14d7144 875->877 878 14d7145-14d7180 875->878 877->878
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 014D712F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 3b278e8d06dc68260984ced65fe47443a1892c78867ae43e505ed3e1392c539a
                                            • Instruction ID: e378659c92db62523d5362ad5e5e0ec133da0ead689e98aaa4160b6c201e9cfe
                                            • Opcode Fuzzy Hash: 3b278e8d06dc68260984ced65fe47443a1892c78867ae43e505ed3e1392c539a
                                            • Instruction Fuzzy Hash: 732145B18002598FDB14CFAAD884BEEBBF4EF49210F14841AE858A3350D778A944CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 829 6b3c120-6b3c12b 830 6b3c155-6b3c174 call 6b3b918 829->830 831 6b3c12d-6b3c154 call 6b3b90c 829->831 837 6b3c176-6b3c179 830->837 838 6b3c17a-6b3c1d9 830->838 846 6b3c1db-6b3c1de 838->846 847 6b3c1df-6b3c26c GlobalMemoryStatusEx 838->847 851 6b3c275-6b3c29d 847->851 852 6b3c26e-6b3c274 847->852 852->851
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2580339994.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_6b30000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f60f354fcc9ab283713053d198f6d60582687fa4b2b94ace5134750b83d7514
                                            • Instruction ID: 4d920f3a2f4bdd4fd2fa1bc11eb3d1b70a63227e7a51ac104535702e798b2880
                                            • Opcode Fuzzy Hash: 9f60f354fcc9ab283713053d198f6d60582687fa4b2b94ace5134750b83d7514
                                            • Instruction Fuzzy Hash: 6D414472E143A58FCB14CFB9D80429EBFF5EF89210F1485AAD404A7281DB389844CBE0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 855 6b3c1f0-6b3c1f5 856 6b3c1f7-6b3c236 855->856 857 6b3c1b6-6b3c1d9 855->857 859 6b3c23e-6b3c249 856->859 864 6b3c1db-6b3c1de 857->864 865 6b3c1df-6b3c236 857->865 860 6b3c24a-6b3c26c GlobalMemoryStatusEx 859->860 862 6b3c275-6b3c29d 860->862 863 6b3c26e-6b3c274 860->863 863->862 865->859
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06B3C172), ref: 06B3C25F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2580339994.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_6b30000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: c6fa5cb359cf42b5fd2914ea642eaed3fca58d31df77ef0c56feb22970b9acf6
                                            • Instruction ID: f090ec8497fd29981cfbf33ebc12c2148d3a8748a45c5fd4727476f1a8cf309b
                                            • Opcode Fuzzy Hash: c6fa5cb359cf42b5fd2914ea642eaed3fca58d31df77ef0c56feb22970b9acf6
                                            • Instruction Fuzzy Hash: 202189B6D002699FDB14CFAAD9447DEFBF5EF48310F14806AD854B7241D738A9408FA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 869 14d70b0-14d713c CheckRemoteDebuggerPresent 871 14d713e-14d7144 869->871 872 14d7145-14d7180 869->872 871->872
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 014D712F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 74526fb50d807938ad54c4ca575ebee34d889ea89eec16cb00780cf43fa51b3e
                                            • Instruction ID: ca8d6fb646bae3136b4a3b10e17d5c0e7e13d858fd3969ecf3f8f00e862b461b
                                            • Opcode Fuzzy Hash: 74526fb50d807938ad54c4ca575ebee34d889ea89eec16cb00780cf43fa51b3e
                                            • Instruction Fuzzy Hash: 772175B2C00219CFCB14CFAAD484BEEBBF4EF48210F14841AE848A3351D738A944CF60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 881 14df028-14df0c4 DuplicateHandle 882 14df0cd-14df0ea 881->882 883 14df0c6-14df0cc 881->883 883->882
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014DF0B7
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: d2c9cb82114f815483637a0e54b1f92f2c73a83481d88dd51f5e6282112265e2
                                            • Instruction ID: 4dee2961d8f871e140864601275b2474a49c5642b4c799992e8e495c4ecd646e
                                            • Opcode Fuzzy Hash: d2c9cb82114f815483637a0e54b1f92f2c73a83481d88dd51f5e6282112265e2
                                            • Instruction Fuzzy Hash: D321E0B5D002499FDB20CFAAD484ADEBFF4EB48310F14841AE959A7350D379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 886 14df030-14df0c4 DuplicateHandle 887 14df0cd-14df0ea 886->887 888 14df0c6-14df0cc 886->888 888->887
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014DF0B7
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: e8bb1ba759c7633d2db7631734373747d07dd0e95a3338fec23bf834b31d5fdb
                                            • Instruction ID: d16f52f5aa4cb9d259bc2db436fd537554497a0361cedd8f7de3143ca7fd394e
                                            • Opcode Fuzzy Hash: e8bb1ba759c7633d2db7631734373747d07dd0e95a3338fec23bf834b31d5fdb
                                            • Instruction Fuzzy Hash: 3F21E2B5D002489FDB10CFAAD884ADEBBF8EB48310F14801AE918A3350D379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 891 14d8430-14d8482 894 14d848a-14d84b5 DeleteFileW 891->894 895 14d8484-14d8487 891->895 896 14d84be-14d84e6 894->896 897 14d84b7-14d84bd 894->897 895->894 897->896
                                            APIs
                                            • DeleteFileW.KERNELBASE(00000000), ref: 014D84A8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 181e049bfc90ab083f00ae3cdc9c79470a4eeccd176796b75025f56fe3f35c74
                                            • Instruction ID: 5a67a1ab8de776525525529e4962da390c132b6444178e605127924fa678248f
                                            • Opcode Fuzzy Hash: 181e049bfc90ab083f00ae3cdc9c79470a4eeccd176796b75025f56fe3f35c74
                                            • Instruction Fuzzy Hash: AD2144B1C0065A9FDB14CF9AD845BEEFBB4EB48320F14812AD818A7340D738A905CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 900 14d8438-14d8482 902 14d848a-14d84b5 DeleteFileW 900->902 903 14d8484-14d8487 900->903 904 14d84be-14d84e6 902->904 905 14d84b7-14d84bd 902->905 903->902 905->904
                                            APIs
                                            • DeleteFileW.KERNELBASE(00000000), ref: 014D84A8
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2555614522.00000000014D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_14d0000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 8be93c50c2b3d58a78adea0bdcc3247cb74216e0795675c310285314d6386870
                                            • Instruction ID: fe5f273a59c06363596d3b77cc744febcdcd0b868a0f8e86974085cf26cb2051
                                            • Opcode Fuzzy Hash: 8be93c50c2b3d58a78adea0bdcc3247cb74216e0795675c310285314d6386870
                                            • Instruction Fuzzy Hash: 701133B1C0065A9FDB14CF9AD444BEEFBF4EF48320F14812AD818A7640D778A940CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 908 6b3b918-6b3c26c GlobalMemoryStatusEx 912 6b3c275-6b3c29d 908->912 913 6b3c26e-6b3c274 908->913 913->912
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06B3C172), ref: 06B3C25F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2580339994.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_6b30000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: a384f80f53c845ba25a34b70279ad4dd422c58da3113fa0433850b9c84f78461
                                            • Instruction ID: 97181b5c1fa8b1759a3beab520033410bf7aa738749edb75c7d8b0e2e4752f2c
                                            • Opcode Fuzzy Hash: a384f80f53c845ba25a34b70279ad4dd422c58da3113fa0433850b9c84f78461
                                            • Instruction Fuzzy Hash: 191122B2C006699FDB10CF9AC444B9EFBF4EB48220F10816AE818B7241D778A914CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 916 6b3c2a4-6b3c2b1 918 6b3c2b3-6b3c2b8 916->918 919 6b3c272-6b3c274 916->919 921 6b3c24a-6b3c26c GlobalMemoryStatusEx 918->921 922 6b3c2ba-6b3c2bf 918->922 920 6b3c275-6b3c29d 919->920 921->920 923 6b3c26e 921->923 923->919
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06B3C172), ref: 06B3C25F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2580339994.0000000006B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_6b30000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: d315269e693f426406f96f160dba4007bd1ddee2d425b84386afd1c9946b73c8
                                            • Instruction ID: 6422ec3dad4f2be8527e05e1ae583e0b24371e76b7d67c8fd153d721c7f55e98
                                            • Opcode Fuzzy Hash: d315269e693f426406f96f160dba4007bd1ddee2d425b84386afd1c9946b73c8
                                            • Instruction Fuzzy Hash: B001F972C053659FEF219BE9C8053DCBFA0AF05324F058196C444BB142C33D950ACBE2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2552776213.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_128d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 608ef27cd6cc1f8d5de97a46129dbacf1266c6798f18e43485b9c93ea82df6ec
                                            • Instruction ID: d35ace5f495ed86b421784bc0d2683140799db024bb6596dcd7407acb1c8eca9
                                            • Opcode Fuzzy Hash: 608ef27cd6cc1f8d5de97a46129dbacf1266c6798f18e43485b9c93ea82df6ec
                                            • Instruction Fuzzy Hash: 47212271524308DFDB15EF94D9C0F26BBA1EB84314F20C66DD90A4B2D2C37AD84BCA62
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2552776213.000000000128D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0128D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_128d000_Cotizaci#U00f3n P13000996 pdf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: b9448e715bf4b214b6e354f4f755d66f1c2ea761050b811d0c49830c7a0581d6
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: C311BB75504288CFCB12DF54D5C0B15BFA1FB84314F28C6AAD9494B697C33AD44BCB62

                                            Execution Graph

                                            Execution Coverage:8.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:215
                                            Total number of Limit Nodes:12
                                            execution_graph 45447 71b9f08 45448 71ba093 45447->45448 45449 71b9f2e 45447->45449 45449->45448 45451 71b5058 45449->45451 45452 71ba188 PostMessageW 45451->45452 45453 71ba1f4 45452->45453 45453->45449 45498 71b7068 45499 71b705f 45498->45499 45500 71b706e 45498->45500 45503 71b8c90 45500->45503 45519 71b8ca0 45500->45519 45504 71b8cba 45503->45504 45509 71b8cde 45504->45509 45535 71b98bb 45504->45535 45540 71b90e0 45504->45540 45545 71b99e8 45504->45545 45550 71b9309 45504->45550 45555 71b9435 45504->45555 45559 71b91d6 45504->45559 45563 71b9616 45504->45563 45568 71b92b7 45504->45568 45573 71b9392 45504->45573 45578 71b95dc 45504->45578 45582 71b931e 45504->45582 45591 71b9adf 45504->45591 45596 71b957a 45504->45596 45509->45499 45520 71b8cba 45519->45520 45521 71b8cde 45520->45521 45522 71b98bb 2 API calls 45520->45522 45523 71b957a 2 API calls 45520->45523 45524 71b9adf 2 API calls 45520->45524 45525 71b931e 4 API calls 45520->45525 45526 71b95dc 2 API calls 45520->45526 45527 71b9392 2 API calls 45520->45527 45528 71b92b7 2 API calls 45520->45528 45529 71b9616 2 API calls 45520->45529 45530 71b91d6 2 API calls 45520->45530 45531 71b9435 2 API calls 45520->45531 45532 71b9309 2 API calls 45520->45532 45533 71b99e8 2 API calls 45520->45533 45534 71b90e0 2 API calls 45520->45534 45521->45499 45522->45521 45523->45521 45524->45521 45525->45521 45526->45521 45527->45521 45528->45521 45529->45521 45530->45521 45531->45521 45532->45521 45533->45521 45534->45521 45536 71b98c4 45535->45536 45601 71b68e8 45536->45601 45605 71b68f0 45536->45605 45537 71b9a16 45541 71b90eb 45540->45541 45542 71b920c 45541->45542 45609 71b6b78 45541->45609 45613 71b6b71 45541->45613 45542->45509 45546 71b99f2 45545->45546 45548 71b68e8 WriteProcessMemory 45546->45548 45549 71b68f0 WriteProcessMemory 45546->45549 45547 71b9a16 45548->45547 45549->45547 45551 71b92be 45550->45551 45617 71b6268 45551->45617 45621 71b6270 45551->45621 45552 71b92ea 45552->45509 45625 71b6758 45555->45625 45629 71b6750 45555->45629 45556 71b9454 45561 71b6b78 CreateProcessA 45559->45561 45562 71b6b71 CreateProcessA 45559->45562 45560 71b920c 45560->45509 45561->45560 45562->45560 45564 71b95db 45563->45564 45566 71b6758 Wow64SetThreadContext 45564->45566 45567 71b6750 Wow64SetThreadContext 45564->45567 45565 71b9571 45566->45565 45567->45565 45569 71b92bd 45568->45569 45571 71b6268 ResumeThread 45569->45571 45572 71b6270 ResumeThread 45569->45572 45570 71b92ea 45570->45509 45571->45570 45572->45570 45574 71b93b5 45573->45574 45576 71b68e8 WriteProcessMemory 45574->45576 45577 71b68f0 WriteProcessMemory 45574->45577 45575 71b9234 45575->45509 45576->45575 45577->45575 45580 71b6758 Wow64SetThreadContext 45578->45580 45581 71b6750 Wow64SetThreadContext 45578->45581 45579 71b9571 45580->45579 45581->45579 45583 71b92cb 45582->45583 45584 71b932b 45582->45584 45583->45509 45633 71b6828 45584->45633 45637 71b6830 45584->45637 45585 71b9346 45586 71b9872 45585->45586 45589 71b68e8 WriteProcessMemory 45585->45589 45590 71b68f0 WriteProcessMemory 45585->45590 45586->45509 45589->45585 45590->45585 45641 71b69d8 45591->45641 45645 71b69e0 45591->45645 45592 71b997e 45592->45591 45593 71b9b72 45592->45593 45597 71b959b 45596->45597 45598 71b9872 45597->45598 45599 71b68e8 WriteProcessMemory 45597->45599 45600 71b68f0 WriteProcessMemory 45597->45600 45598->45509 45599->45597 45600->45597 45602 71b6938 WriteProcessMemory 45601->45602 45604 71b698f 45602->45604 45604->45537 45606 71b6938 WriteProcessMemory 45605->45606 45608 71b698f 45606->45608 45608->45537 45610 71b6c01 45609->45610 45610->45610 45611 71b6d66 CreateProcessA 45610->45611 45612 71b6dc3 45611->45612 45614 71b6c01 45613->45614 45614->45614 45615 71b6d66 CreateProcessA 45614->45615 45616 71b6dc3 45615->45616 45618 71b62b0 ResumeThread 45617->45618 45620 71b62e1 45618->45620 45620->45552 45622 71b62b0 ResumeThread 45621->45622 45624 71b62e1 45622->45624 45624->45552 45626 71b679d Wow64SetThreadContext 45625->45626 45628 71b67e5 45626->45628 45628->45556 45630 71b679d Wow64SetThreadContext 45629->45630 45632 71b67e5 45630->45632 45632->45556 45634 71b6870 VirtualAllocEx 45633->45634 45636 71b68ad 45634->45636 45636->45585 45638 71b6870 VirtualAllocEx 45637->45638 45640 71b68ad 45638->45640 45640->45585 45642 71b6a2b ReadProcessMemory 45641->45642 45644 71b6a6f 45642->45644 45644->45592 45646 71b6a2b ReadProcessMemory 45645->45646 45648 71b6a6f 45646->45648 45648->45592 45403 118d01c 45404 118d034 45403->45404 45405 118d08e 45404->45405 45408 5312809 45404->45408 45413 5312818 45404->45413 45409 5312818 45408->45409 45410 5312877 45409->45410 45418 5312da8 45409->45418 45423 5312d7d 45409->45423 45414 5312845 45413->45414 45415 5312877 45414->45415 45416 5312da8 2 API calls 45414->45416 45417 5312d7d 2 API calls 45414->45417 45416->45415 45417->45415 45420 5312dbc 45418->45420 45419 5312e48 45419->45410 45428 5312e60 45420->45428 45431 5312e50 45420->45431 45425 5312da8 45423->45425 45424 5312e48 45424->45410 45426 5312e60 2 API calls 45425->45426 45427 5312e50 2 API calls 45425->45427 45426->45424 45427->45424 45429 5312e71 45428->45429 45435 5314023 45428->45435 45429->45419 45432 5312e60 45431->45432 45433 5312e71 45432->45433 45434 5314023 2 API calls 45432->45434 45433->45419 45434->45433 45439 5314050 45435->45439 45443 5314040 45435->45443 45436 531403a 45436->45429 45440 5314092 45439->45440 45442 5314099 45439->45442 45441 53140ea CallWindowProcW 45440->45441 45440->45442 45441->45442 45442->45436 45444 5314050 45443->45444 45445 53140ea CallWindowProcW 45444->45445 45446 5314099 45444->45446 45445->45446 45446->45436 45454 2bc4668 45455 2bc467a 45454->45455 45456 2bc4686 45455->45456 45458 2bc4778 45455->45458 45459 2bc479d 45458->45459 45463 2bc4888 45459->45463 45467 2bc4878 45459->45467 45465 2bc48af 45463->45465 45464 2bc498c 45464->45464 45465->45464 45471 2bc44e4 45465->45471 45468 2bc4882 45467->45468 45469 2bc44e4 CreateActCtxA 45468->45469 45470 2bc498c 45468->45470 45469->45470 45472 2bc5918 CreateActCtxA 45471->45472 45474 2bc59db 45472->45474 45475 2bcd3d8 45476 2bcd41e 45475->45476 45480 2bcd5b8 45476->45480 45483 2bcd5a8 45476->45483 45477 2bcd50b 45487 2bcb730 45480->45487 45484 2bcd5b8 45483->45484 45485 2bcb730 DuplicateHandle 45484->45485 45486 2bcd5e6 45485->45486 45486->45477 45488 2bcd620 DuplicateHandle 45487->45488 45489 2bcd5e6 45488->45489 45489->45477 45649 53e5848 45650 53e58a1 45649->45650 45651 53e58da 45650->45651 45653 53e5908 45650->45653 45655 53e590d 45653->45655 45654 53e5913 45654->45651 45655->45654 45659 53e5fa0 45655->45659 45664 53e5f90 45655->45664 45656 53e59ad 45656->45651 45661 53e5fc1 45659->45661 45660 53e5fd6 45660->45656 45661->45660 45669 53e4434 45661->45669 45663 53e6041 45666 53e5fa0 45664->45666 45665 53e5fd6 45665->45656 45666->45665 45667 53e4434 DrawTextExW 45666->45667 45668 53e6041 45667->45668 45671 53e443f 45669->45671 45670 53e7c09 45670->45663 45671->45670 45675 53e8770 45671->45675 45678 53e8780 45671->45678 45672 53e7d1c 45672->45663 45681 53e7024 45675->45681 45679 53e879d 45678->45679 45680 53e7024 DrawTextExW 45678->45680 45679->45672 45680->45679 45682 53e87b8 DrawTextExW 45681->45682 45684 53e879d 45682->45684 45684->45672 45490 2bcac50 45493 2bcad48 45490->45493 45491 2bcac5f 45494 2bcad7c 45493->45494 45495 2bcad59 45493->45495 45494->45491 45495->45494 45496 2bcaf80 GetModuleHandleW 45495->45496 45497 2bcafad 45496->45497 45497->45491

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2476 71b6b78-71b6c0d 2478 71b6c0f-71b6c19 2476->2478 2479 71b6c46-71b6c66 2476->2479 2478->2479 2480 71b6c1b-71b6c1d 2478->2480 2486 71b6c68-71b6c72 2479->2486 2487 71b6c9f-71b6cce 2479->2487 2481 71b6c1f-71b6c29 2480->2481 2482 71b6c40-71b6c43 2480->2482 2484 71b6c2b 2481->2484 2485 71b6c2d-71b6c3c 2481->2485 2482->2479 2484->2485 2485->2485 2488 71b6c3e 2485->2488 2486->2487 2489 71b6c74-71b6c76 2486->2489 2493 71b6cd0-71b6cda 2487->2493 2494 71b6d07-71b6dc1 CreateProcessA 2487->2494 2488->2482 2491 71b6c99-71b6c9c 2489->2491 2492 71b6c78-71b6c82 2489->2492 2491->2487 2495 71b6c86-71b6c95 2492->2495 2496 71b6c84 2492->2496 2493->2494 2497 71b6cdc-71b6cde 2493->2497 2507 71b6dca-71b6e50 2494->2507 2508 71b6dc3-71b6dc9 2494->2508 2495->2495 2498 71b6c97 2495->2498 2496->2495 2499 71b6d01-71b6d04 2497->2499 2500 71b6ce0-71b6cea 2497->2500 2498->2491 2499->2494 2502 71b6cee-71b6cfd 2500->2502 2503 71b6cec 2500->2503 2502->2502 2504 71b6cff 2502->2504 2503->2502 2504->2499 2518 71b6e52-71b6e56 2507->2518 2519 71b6e60-71b6e64 2507->2519 2508->2507 2518->2519 2520 71b6e58 2518->2520 2521 71b6e66-71b6e6a 2519->2521 2522 71b6e74-71b6e78 2519->2522 2520->2519 2521->2522 2523 71b6e6c 2521->2523 2524 71b6e7a-71b6e7e 2522->2524 2525 71b6e88-71b6e8c 2522->2525 2523->2522 2524->2525 2528 71b6e80 2524->2528 2526 71b6e9e-71b6ea5 2525->2526 2527 71b6e8e-71b6e94 2525->2527 2529 71b6ebc 2526->2529 2530 71b6ea7-71b6eb6 2526->2530 2527->2526 2528->2525 2532 71b6ebd 2529->2532 2530->2529 2532->2532
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071B6DAE
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 569266e8d7a25afc2ff360cbd838d2412acf3febeb7c02a64998000a45ccda9c
                                            • Instruction ID: bbea8b72d3e4ed2d37316c5b89c5a2860d3f52c947bbb7d36316b1336800d0bc
                                            • Opcode Fuzzy Hash: 569266e8d7a25afc2ff360cbd838d2412acf3febeb7c02a64998000a45ccda9c
                                            • Instruction Fuzzy Hash: 8C913CB1D10219CFEB25CFA9C851BEDBBB2FF48310F148569E818A7280DB759985CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2419 71b6b71-71b6c0d 2421 71b6c0f-71b6c19 2419->2421 2422 71b6c46-71b6c66 2419->2422 2421->2422 2423 71b6c1b-71b6c1d 2421->2423 2429 71b6c68-71b6c72 2422->2429 2430 71b6c9f-71b6cce 2422->2430 2424 71b6c1f-71b6c29 2423->2424 2425 71b6c40-71b6c43 2423->2425 2427 71b6c2b 2424->2427 2428 71b6c2d-71b6c3c 2424->2428 2425->2422 2427->2428 2428->2428 2431 71b6c3e 2428->2431 2429->2430 2432 71b6c74-71b6c76 2429->2432 2436 71b6cd0-71b6cda 2430->2436 2437 71b6d07-71b6dc1 CreateProcessA 2430->2437 2431->2425 2434 71b6c99-71b6c9c 2432->2434 2435 71b6c78-71b6c82 2432->2435 2434->2430 2438 71b6c86-71b6c95 2435->2438 2439 71b6c84 2435->2439 2436->2437 2440 71b6cdc-71b6cde 2436->2440 2450 71b6dca-71b6e50 2437->2450 2451 71b6dc3-71b6dc9 2437->2451 2438->2438 2441 71b6c97 2438->2441 2439->2438 2442 71b6d01-71b6d04 2440->2442 2443 71b6ce0-71b6cea 2440->2443 2441->2434 2442->2437 2445 71b6cee-71b6cfd 2443->2445 2446 71b6cec 2443->2446 2445->2445 2447 71b6cff 2445->2447 2446->2445 2447->2442 2461 71b6e52-71b6e56 2450->2461 2462 71b6e60-71b6e64 2450->2462 2451->2450 2461->2462 2463 71b6e58 2461->2463 2464 71b6e66-71b6e6a 2462->2464 2465 71b6e74-71b6e78 2462->2465 2463->2462 2464->2465 2466 71b6e6c 2464->2466 2467 71b6e7a-71b6e7e 2465->2467 2468 71b6e88-71b6e8c 2465->2468 2466->2465 2467->2468 2471 71b6e80 2467->2471 2469 71b6e9e-71b6ea5 2468->2469 2470 71b6e8e-71b6e94 2468->2470 2472 71b6ebc 2469->2472 2473 71b6ea7-71b6eb6 2469->2473 2470->2469 2471->2468 2475 71b6ebd 2472->2475 2473->2472 2475->2475
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071B6DAE
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: dcb55ebbd725e403ba79b5d8d30072d3dc08facad7e4f7580a4ebae8e955ec11
                                            • Instruction ID: 84f425e6f8378c9c51d2d0bcf98da582fdbd1f0dcfd8bcff442b861a51ad0507
                                            • Opcode Fuzzy Hash: dcb55ebbd725e403ba79b5d8d30072d3dc08facad7e4f7580a4ebae8e955ec11
                                            • Instruction Fuzzy Hash: FD914DB1D10219CFEB25CFA9C9517EDBBB2FF48310F148569E808A7280DB759985CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2533 2bcad48-2bcad57 2534 2bcad59-2bcad66 call 2bca0a0 2533->2534 2535 2bcad83-2bcad87 2533->2535 2540 2bcad7c 2534->2540 2541 2bcad68 2534->2541 2537 2bcad89-2bcad93 2535->2537 2538 2bcad9b-2bcaddc 2535->2538 2537->2538 2544 2bcadde-2bcade6 2538->2544 2545 2bcade9-2bcadf7 2538->2545 2540->2535 2589 2bcad6e call 2bcafe0 2541->2589 2590 2bcad6e call 2bcafd0 2541->2590 2544->2545 2546 2bcadf9-2bcadfe 2545->2546 2547 2bcae1b-2bcae1d 2545->2547 2549 2bcae09 2546->2549 2550 2bcae00-2bcae07 call 2bca0ac 2546->2550 2552 2bcae20-2bcae27 2547->2552 2548 2bcad74-2bcad76 2548->2540 2551 2bcaeb8-2bcaf78 2548->2551 2554 2bcae0b-2bcae19 2549->2554 2550->2554 2584 2bcaf7a-2bcaf7d 2551->2584 2585 2bcaf80-2bcafab GetModuleHandleW 2551->2585 2555 2bcae29-2bcae31 2552->2555 2556 2bcae34-2bcae3b 2552->2556 2554->2552 2555->2556 2558 2bcae3d-2bcae45 2556->2558 2559 2bcae48-2bcae4a call 2bca0bc 2556->2559 2558->2559 2563 2bcae4f-2bcae51 2559->2563 2564 2bcae5e-2bcae63 2563->2564 2565 2bcae53-2bcae5b 2563->2565 2566 2bcae65-2bcae6c 2564->2566 2567 2bcae81-2bcae8e 2564->2567 2565->2564 2566->2567 2569 2bcae6e-2bcae7e call 2bca0cc call 2bca0dc 2566->2569 2574 2bcae90-2bcaeae 2567->2574 2575 2bcaeb1-2bcaeb7 2567->2575 2569->2567 2574->2575 2584->2585 2586 2bcafad-2bcafb3 2585->2586 2587 2bcafb4-2bcafc8 2585->2587 2586->2587 2589->2548 2590->2548
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02BCAF9E
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: dfd26175e2c9e863c86a3cc1bfd8e5e733b79701c163d3c0ee878d8ad1bb30da
                                            • Instruction ID: 4e4ea0e23de7e43551b47050f3e45d79427eb024ec33e665c43d590b17cff96a
                                            • Opcode Fuzzy Hash: dfd26175e2c9e863c86a3cc1bfd8e5e733b79701c163d3c0ee878d8ad1bb30da
                                            • Instruction Fuzzy Hash: 2E7126B0A00B098FD724DF6AD44475ABBF5FF88304F208A6ED48AD7A40DB75E845CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2591 2bc44e4-2bc59d9 CreateActCtxA 2594 2bc59db-2bc59e1 2591->2594 2595 2bc59e2-2bc5a3c 2591->2595 2594->2595 2602 2bc5a3e-2bc5a41 2595->2602 2603 2bc5a4b-2bc5a4f 2595->2603 2602->2603 2604 2bc5a60-2bc5a90 2603->2604 2605 2bc5a51-2bc5a5d 2603->2605 2609 2bc5a42 2604->2609 2610 2bc5a92-2bc5b14 2604->2610 2605->2604 2609->2603
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02BC59C9
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: a85f0321f2e5ca48110e87bc9cb9786b09ad966be0fa8750f08cc9c7049f6bbd
                                            • Instruction ID: a9071ae0f508c1ad436d9eaeb920e957e4e16e56acc19728292850fa0dde9741
                                            • Opcode Fuzzy Hash: a85f0321f2e5ca48110e87bc9cb9786b09ad966be0fa8750f08cc9c7049f6bbd
                                            • Instruction Fuzzy Hash: 3E41B271C00719CBDB28DFAAC884B9DBBF5FF49304F60805AE419AB251D7756946CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2612 2bc590d-2bc59d9 CreateActCtxA 2614 2bc59db-2bc59e1 2612->2614 2615 2bc59e2-2bc5a3c 2612->2615 2614->2615 2622 2bc5a3e-2bc5a41 2615->2622 2623 2bc5a4b-2bc5a4f 2615->2623 2622->2623 2624 2bc5a60-2bc5a90 2623->2624 2625 2bc5a51-2bc5a5d 2623->2625 2629 2bc5a42 2624->2629 2630 2bc5a92-2bc5b14 2624->2630 2625->2624 2629->2623
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02BC59C9
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 3acd7107299d5e28a9d9b08afd818f7f49b863b4af6dddb6899b41834f7a4a69
                                            • Instruction ID: e87e138a1d3605eb3989d45dd32c90976b137351e1eebf55d57c7cdba8de8a0f
                                            • Opcode Fuzzy Hash: 3acd7107299d5e28a9d9b08afd818f7f49b863b4af6dddb6899b41834f7a4a69
                                            • Instruction Fuzzy Hash: 7641C170C00719CFDB28CFAAC884B9DBBB1FF49304F60805AE419AB251DB75694ACF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2632 5314050-531408c 2633 5314092-5314097 2632->2633 2634 531413c-531415c 2632->2634 2635 5314099-53140d0 2633->2635 2636 53140ea-5314122 CallWindowProcW 2633->2636 2640 531415f-531416c 2634->2640 2643 53140d2-53140d8 2635->2643 2644 53140d9-53140e8 2635->2644 2637 5314124-531412a 2636->2637 2638 531412b-531413a 2636->2638 2637->2638 2638->2640 2643->2644 2644->2640
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 05314111
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1381420132.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_5310000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: c55c3505a83443e6fdb1f282485fc56f47331b7b84d58449ae5a4cf3f3a34a58
                                            • Instruction ID: bc64c7f43653696bd13fa02cdb0b117ae86a1c3ed7107c6f59d7b89642fa0f5c
                                            • Opcode Fuzzy Hash: c55c3505a83443e6fdb1f282485fc56f47331b7b84d58449ae5a4cf3f3a34a58
                                            • Instruction Fuzzy Hash: 7F41EAB9A00305CFDB18CF99C448AAABBF6FF88314F24C459D519AB321D775A845CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2646 2bcd6e1-2bcd6e8 2647 2bcd6ea-2bcd80e 2646->2647 2648 2bcd6a4-2bcd6b4 DuplicateHandle 2646->2648 2650 2bcd6bd-2bcd6da 2648->2650 2651 2bcd6b6-2bcd6bc 2648->2651 2651->2650
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02BCD5E6,?,?,?,?,?), ref: 02BCD6A7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 3ef88fd98cf29a7e7a5273d9a63c6784d32caebc6ec64463dc4ce00d58dccc74
                                            • Instruction ID: bb21c4a98eb26071eb5235bc1f8a466cbda3b2b73b514deab43b401ea8ddb22c
                                            • Opcode Fuzzy Hash: 3ef88fd98cf29a7e7a5273d9a63c6784d32caebc6ec64463dc4ce00d58dccc74
                                            • Instruction Fuzzy Hash: 3A317235E403849FEF04EF60F4997693BA6FB88710F20863AE9158B7D6CAB44859DF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2665 53e7024-53e8804 2667 53e880f-53e881e 2665->2667 2668 53e8806-53e880c 2665->2668 2669 53e8823-53e885c DrawTextExW 2667->2669 2670 53e8820 2667->2670 2668->2667 2671 53e885e-53e8864 2669->2671 2672 53e8865-53e8882 2669->2672 2670->2669 2671->2672
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,053E879D,?,?), ref: 053E884F
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1381533945.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_53e0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: 4b12100453eeb2715038d2b3ec5ede71d6338b62f3f69ef367262d932582318e
                                            • Instruction ID: f8d557957be76a58a3adbec7cec145cf181bc40639832046b596bb80bed90ad7
                                            • Opcode Fuzzy Hash: 4b12100453eeb2715038d2b3ec5ede71d6338b62f3f69ef367262d932582318e
                                            • Instruction Fuzzy Hash: AB31EEB5D003199FDB10CF9AD884AAEFBF5FB48320F14842AE819A7250D774A940CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2685 71b68e8-71b693e 2687 71b694e-71b698d WriteProcessMemory 2685->2687 2688 71b6940-71b694c 2685->2688 2690 71b698f-71b6995 2687->2690 2691 71b6996-71b69c6 2687->2691 2688->2687 2690->2691
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071B6980
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: c78e673640da858e163cb2a03c073dd538e748a999f99c52fb9e0b9eeb6185bf
                                            • Instruction ID: e683d85b56e216152dbcb7bcc520fe4acba315eb58668b411d0d074a73a13a1f
                                            • Opcode Fuzzy Hash: c78e673640da858e163cb2a03c073dd538e748a999f99c52fb9e0b9eeb6185bf
                                            • Instruction Fuzzy Hash: D12137B5900359DFDB24CFA9C880BDEBBF1FF48310F10882AE958A7240C7799A45CB60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2675 53e87b0-53e8804 2677 53e880f-53e881e 2675->2677 2678 53e8806-53e880c 2675->2678 2679 53e8823-53e885c DrawTextExW 2677->2679 2680 53e8820 2677->2680 2678->2677 2681 53e885e-53e8864 2679->2681 2682 53e8865-53e8882 2679->2682 2680->2679 2681->2682
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,053E879D,?,?), ref: 053E884F
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1381533945.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_53e0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: 46bad1adadad04f1f9aa301323210ba6b687a11a6bcd3906d27b14e362721896
                                            • Instruction ID: c22713df8f5963a7940aacabb43e03ddd0c078c5acc86aa7972dc2626e919c7e
                                            • Opcode Fuzzy Hash: 46bad1adadad04f1f9aa301323210ba6b687a11a6bcd3906d27b14e362721896
                                            • Instruction Fuzzy Hash: 2C31EEB5D003099FDB10CFAAD884ADEFBF5FB48320F14842AE819A7250D775A940CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2695 71b68f0-71b693e 2697 71b694e-71b698d WriteProcessMemory 2695->2697 2698 71b6940-71b694c 2695->2698 2700 71b698f-71b6995 2697->2700 2701 71b6996-71b69c6 2697->2701 2698->2697 2700->2701
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071B6980
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 7a9abd2e8782342b9f588d87c44b15431b374d51b360e9b6e18d11bce857fd88
                                            • Instruction ID: ff452511db164179759d5b179ff86dcde1ac0c64f9e2bd3359098069b3dbf5af
                                            • Opcode Fuzzy Hash: 7a9abd2e8782342b9f588d87c44b15431b374d51b360e9b6e18d11bce857fd88
                                            • Instruction Fuzzy Hash: 992127B59003599FDB24CFAAC880BDEBBF5FF48310F10842AE958A7240C7799940CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2705 2bcb730-2bcd6b4 DuplicateHandle 2707 2bcd6bd-2bcd6da 2705->2707 2708 2bcd6b6-2bcd6bc 2705->2708 2708->2707
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02BCD5E6,?,?,?,?,?), ref: 02BCD6A7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: e066e9a24fd4bef12f771cb969f78d9407f8d02d59772ab067aa9945347aae1b
                                            • Instruction ID: 9e0efecb5c28bfa8054cfdd7b992d7275a0d1846509d7183ee1ccd455b53e4bb
                                            • Opcode Fuzzy Hash: e066e9a24fd4bef12f771cb969f78d9407f8d02d59772ab067aa9945347aae1b
                                            • Instruction Fuzzy Hash: 0121E5B59002499FDB10DF9AD584ADEBBF4EB48310F14846AE959A7350D378A940CFA4
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 071B67D6
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: b00858c3649c47e642eb3b0324ab548efc9dba01c9564dfdec8f809956e8122f
                                            • Instruction ID: f98877b8a75782f2350413a9179fc0994a2904b742ea749a687972ffea6d840d
                                            • Opcode Fuzzy Hash: b00858c3649c47e642eb3b0324ab548efc9dba01c9564dfdec8f809956e8122f
                                            • Instruction Fuzzy Hash: DB2118B5D003099FDB24DFAAC485BEEBBF4EF48310F14842AD559A7240CB789945CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2711 71b6750-71b67a3 2713 71b67b3-71b67e3 Wow64SetThreadContext 2711->2713 2714 71b67a5-71b67b1 2711->2714 2716 71b67ec-71b681c 2713->2716 2717 71b67e5-71b67eb 2713->2717 2714->2713 2717->2716
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 071B67D6
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 38642f714b33ad16f768a8a26517c53eff80c6f5ad895e92aad588cf470f68e7
                                            • Instruction ID: 695401c2ab59ea29673aeb011543a707334b5a40f975bc79676a60ae3e5a6aa0
                                            • Opcode Fuzzy Hash: 38642f714b33ad16f768a8a26517c53eff80c6f5ad895e92aad588cf470f68e7
                                            • Instruction Fuzzy Hash: 122138B5D003099FDB24DFAAC585BEEBBF4EF48210F14842ED559A7240CB789945CFA4
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071B6A60
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: d3ffa785a124b212d6b4052680724edc0d4665713530dff249c4635ed36e2063
                                            • Instruction ID: e342bc6d7366f693dcad4192234f3c88aec187ab4cffd1a4f50dc63ad7a2a7d2
                                            • Opcode Fuzzy Hash: d3ffa785a124b212d6b4052680724edc0d4665713530dff249c4635ed36e2063
                                            • Instruction Fuzzy Hash: 5C2105B1C002599FDB24CFAAD980BEEBBF1FF48310F10842AE959A7240C7799945CB64
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071B6A60
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 3d6241e4d50f57f16aa3113360e283d03646e587310baf205a44ac64a92d7b9c
                                            • Instruction ID: 70cce3356690da187de9cfdeb2ba145b69a66d166b54a0fe30d5e046e6b17750
                                            • Opcode Fuzzy Hash: 3d6241e4d50f57f16aa3113360e283d03646e587310baf205a44ac64a92d7b9c
                                            • Instruction Fuzzy Hash: 8D2116B1C003599FDB14CFAAC840BEEBBF5FF48310F10842AE919A7240C7799940CBA4
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 071BA1E5
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 603fe91fda58d6681c8cc722e0907b5c2bc69a1ac72e5b2389b8a57475539e76
                                            • Instruction ID: a95abb340acaf12dc5824229a7d2fb23610c706228fa64aa07644b8d30c5fe4e
                                            • Opcode Fuzzy Hash: 603fe91fda58d6681c8cc722e0907b5c2bc69a1ac72e5b2389b8a57475539e76
                                            • Instruction Fuzzy Hash: 002104BA8002499FDB20DF99D545BDEBBF8EF48320F20841AD558A7640C379A654CFA0
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02BCD5E6,?,?,?,?,?), ref: 02BCD6A7
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: b71fe29646bf17ae772739ef6a888d16e4a6db56bdfe9f397e070909c51e23e0
                                            • Instruction ID: 654b268ec6179b9a324473f90a3fad95162daa75166877f7732cd510367779a9
                                            • Opcode Fuzzy Hash: b71fe29646bf17ae772739ef6a888d16e4a6db56bdfe9f397e070909c51e23e0
                                            • Instruction Fuzzy Hash: 0C21F5B9D00209DFDB10CFAAD584ADEBBF5FB48314F24846AE958A7350C378A940CF64
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071B689E
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: f1377a959dc5e65925e2ec56ed4becca1b5cada457dce7e0f2bc09d51a897b11
                                            • Instruction ID: 026b1ae2907574b498ef07deb92161141e93725814fda6dc4d614a695e770a22
                                            • Opcode Fuzzy Hash: f1377a959dc5e65925e2ec56ed4becca1b5cada457dce7e0f2bc09d51a897b11
                                            • Instruction Fuzzy Hash: 0D1159B6800349DFDB24CFAAC845BDEBBF5EF48310F14881AD959A7250C7799940CFA4
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071B689E
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 116961b47445b147dd05a7c77e4bf2f70b225f180e78ec61efb91251643ebc08
                                            • Instruction ID: 8ad1c1f0582c2a68f50c49a9680b0aa74c482fe867edb20a06bedb5bdd11c909
                                            • Opcode Fuzzy Hash: 116961b47445b147dd05a7c77e4bf2f70b225f180e78ec61efb91251643ebc08
                                            • Instruction Fuzzy Hash: 4E1126768003499FDB24DFAAD845BDEBBF5EF48310F14881AE919A7250CB799940CFA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 766c96c609562cf9f87f3dfbefa03de5917ad3da1e94b4c482c7bfec54b5fe68
                                            • Instruction ID: e9dc8d2fb798871db69f6b175c2e2be8936c1f92885effbea9568b4124e84a0f
                                            • Opcode Fuzzy Hash: 766c96c609562cf9f87f3dfbefa03de5917ad3da1e94b4c482c7bfec54b5fe68
                                            • Instruction Fuzzy Hash: 831188B5D003498FDB24CFAAC445BEEFBF4EF48210F20881AC419A7240CB39A901CFA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: c113d0d35a6c45a3ad8b91992ddcfcfb682181d10ee1e97385302304fe9ffbea
                                            • Instruction ID: db3ecf49b13168488b04822ebb9001789a3d1817da7562a2d795958feb48693a
                                            • Opcode Fuzzy Hash: c113d0d35a6c45a3ad8b91992ddcfcfb682181d10ee1e97385302304fe9ffbea
                                            • Instruction Fuzzy Hash: AA113AB5D003498FDB24DFAAD444BDEFBF5EF48210F14881AD519A7240CB79A941CFA5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 071BA1E5
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1383038206.00000000071B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_71b0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: a7863748f47dc8b1e8a2d05fedb5c163357b7f628a627d64eb5b1d39e0536dc2
                                            • Instruction ID: 1a265f3ecdffd9ed49978128ec4f199024ff903778ac9a770e482a5cf2bb8c4d
                                            • Opcode Fuzzy Hash: a7863748f47dc8b1e8a2d05fedb5c163357b7f628a627d64eb5b1d39e0536dc2
                                            • Instruction Fuzzy Hash: 651103B5804349DFDB20DF9AD884BDEBBF8EF58310F10841AE558A7640C379A944CFA5
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02BCAF9E
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1370333793.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_2bc0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 3dff1c45b3350c488ba425007793efef9bd128e77b5197dec6dfffe8115372ec
                                            • Instruction ID: 69e49be3d0ae284e86af4f31a0238e23f2070ea42161d231ff5a3f6ca419ed8c
                                            • Opcode Fuzzy Hash: 3dff1c45b3350c488ba425007793efef9bd128e77b5197dec6dfffe8115372ec
                                            • Instruction Fuzzy Hash: 871110B6C002498FCB20CF9AD444BDEFBF4EB88214F20846AD818A7600C379A545CFA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e6e5097537693146e3163fe8cce7dfa06a0aacdf0204055a78af04f73938710
                                            • Instruction ID: 4bf6f7b508f2c1ad000fed22f982e19446113eb7f80daa6a1771f4c8e2295539
                                            • Opcode Fuzzy Hash: 9e6e5097537693146e3163fe8cce7dfa06a0aacdf0204055a78af04f73938710
                                            • Instruction Fuzzy Hash: AF210671504340DFDF15DF94D9C0B2ABBA5FB99324F20C5A9ED490B256C336D81ACBA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0dd2b07935708b71f0724994bcca61acbe4455ab9b1c66a828ff8317091b69a3
                                            • Instruction ID: 105290ea154e9ed6c0ff66e0e61ffa3e0df2e1a861c0b461a29b06ece8d105fb
                                            • Opcode Fuzzy Hash: 0dd2b07935708b71f0724994bcca61acbe4455ab9b1c66a828ff8317091b69a3
                                            • Instruction Fuzzy Hash: A8214571500250DFDB15DF94D9C0F2ABFA5FB88318F20C5A9E8890F256C376D846CBA2
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369428675.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_118d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4893cdca8600757cab1d1bfe34eca71109772857c1c1d3d25c5bbb2754b00fde
                                            • Instruction ID: 33117cb56f111f73b83bbac96b60a575996941b6638d4e150e1ebd144f7ddd6b
                                            • Opcode Fuzzy Hash: 4893cdca8600757cab1d1bfe34eca71109772857c1c1d3d25c5bbb2754b00fde
                                            • Instruction Fuzzy Hash: 1A21F271604304DFDF19EF94E9C0B16BB65EB84314F20C56DD94A4B296C33AD447CE62
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369428675.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_118d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a51a7cb97112f6fcb75fc2a9ee7edeec6f447268c10b971379f1e82e6fd9517a
                                            • Instruction ID: bbc7eb81bb04b5be3b4608876c4c30c007e64f1c8c501470ee0cb0a0a3c630ce
                                            • Opcode Fuzzy Hash: a51a7cb97112f6fcb75fc2a9ee7edeec6f447268c10b971379f1e82e6fd9517a
                                            • Instruction Fuzzy Hash: 7121B3715043049FDF19EF94E5C0F15BB66FB84324F24C56DE9494B292C336D446CE62
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34ed18dbe1fbc7fec028946c4a8f46b05e137d48d9d88c732245ebcda57f4e15
                                            • Instruction ID: c7505925b141547a239473072b8a1b312b7b34e2bb49ba13450b3e8702e0b1e4
                                            • Opcode Fuzzy Hash: 34ed18dbe1fbc7fec028946c4a8f46b05e137d48d9d88c732245ebcda57f4e15
                                            • Instruction Fuzzy Hash: 6D21DF76404240CFCB06CF44D9C4B16BFB2FB85324F24C5AADD480B656C33AD82ACBA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction ID: 2dce1d8bb9179c93f26a7e88a2c1d4b9409c3a1e207a931c19a8fa63448e685e
                                            • Opcode Fuzzy Hash: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction Fuzzy Hash: 5C110372404280CFCB12CF54D5C0B16BFB1FB84318F24C6A9D8490B657C336D856CBA1
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369428675.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_118d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: d5d3c46316ad870d51da97bf15a0ac8679640b807f70a79f316d60a5c7cbf2ed
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: E211BB75504280DFCF16DF54E5C0B15BFA2FB84324F24C6AAD8494B696C33AD40ACF62
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369428675.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_118d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: 3629884bedf4d93838aa4b693c812e0684de9c8601af1419640affd9166beb80
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: 1311A975504380CFDB16DF54E584B15BBA2FB84314F24C6AAD8494B696C33AD40BCFA2
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c57fd318a93513a66f84b11c559b28ea5784d05f02ba35aac7e701d6935a9806
                                            • Instruction ID: 804432b214b8b355c8372229d2deef1014ee990fdf45eddbb46a11b356a13e6c
                                            • Opcode Fuzzy Hash: c57fd318a93513a66f84b11c559b28ea5784d05f02ba35aac7e701d6935a9806
                                            • Instruction Fuzzy Hash: 1601A2314043949EF7608BA5CD84B6AFBE8FF41224F18C55AED894A686D37D9C40CBB2
                                            Memory Dump Source
                                            • Source File: 0000000B.00000002.1369289644.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_11_2_102d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8662c3487e4172589f7715e036b12f1657bd52e3f528be0ea09c53f4dce3796e
                                            • Instruction ID: 5452105b2cc533a8bfc250bd3f95aadf3fe3c1f27621e69bde9e8c75696a34cb
                                            • Opcode Fuzzy Hash: 8662c3487e4172589f7715e036b12f1657bd52e3f528be0ea09c53f4dce3796e
                                            • Instruction Fuzzy Hash: 3DF0C2310043949EE7208B0ACD84B62FFE8EF41724F18C45BED484B286C2799844CBB1

                                            Execution Graph

                                            Execution Coverage:12.6%
                                            Dynamic/Decrypted Code Coverage:63%
                                            Signature Coverage:0%
                                            Total number of Nodes:27
                                            Total number of Limit Nodes:4
                                            execution_graph 26139 151f020 DuplicateHandle 26140 151f0b6 26139->26140 26141 15109a2 26142 151084e 26141->26142 26143 151091b 26142->26143 26145 1511380 26142->26145 26147 1511383 26145->26147 26146 15114ba 26146->26142 26147->26146 26149 1518610 26147->26149 26150 151861a 26149->26150 26153 1518634 26150->26153 26154 6bab2fa 26150->26154 26159 6bab308 26150->26159 26153->26147 26155 6bab31d 26154->26155 26156 6bab532 26155->26156 26157 6bab960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26155->26157 26158 6bab928 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26155->26158 26156->26153 26157->26155 26158->26155 26160 6bab31d 26159->26160 26161 6bab532 26160->26161 26162 6bab928 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26160->26162 26163 6bab960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 26160->26163 26161->26153 26162->26160 26163->26160 26132 1518438 26133 151847e DeleteFileW 26132->26133 26135 15184b7 26133->26135 26136 15170b8 26137 15170fc CheckRemoteDebuggerPresent 26136->26137 26138 151713e 26137->26138

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 834 6bac120-6bac12b 835 6bac12d-6bac154 call 6bab90c 834->835 836 6bac155-6bac174 call 6bab918 834->836 842 6bac17a-6bac1d9 836->842 843 6bac176-6bac179 836->843 851 6bac1db-6bac1de 842->851 852 6bac1df-6bac265 GlobalMemoryStatusEx 842->852 857 6bac269-6bac26c 852->857 858 6bac26e-6bac274 857->858 859 6bac275-6bac29d 857->859 858->859
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2579506160.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_6ba0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f09b8ed965b14ae4c189fce7b859b8bfa3e067cbed8673f21c8fd8f6a22462b7
                                            • Instruction ID: dc964d43016231f78c4015ccabd00114e69eac9dcd54ebec292229a5a2bb173d
                                            • Opcode Fuzzy Hash: f09b8ed965b14ae4c189fce7b859b8bfa3e067cbed8673f21c8fd8f6a22462b7
                                            • Instruction Fuzzy Hash: 99410372E083598FCB14DFA9D8046EEBFF5EF89210F1485ABD404A7281DB789940CBE1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 862 6bac1f0-6bac1f5 863 6bac1ad-6bac1d9 862->863 864 6bac1f7-6bac236 862->864 869 6bac1db-6bac1de 863->869 870 6bac1df-6bac236 863->870 866 6bac23e-6bac249 864->866 868 6bac24a-6bac265 GlobalMemoryStatusEx 866->868 871 6bac269-6bac26c 868->871 870->866 872 6bac26e-6bac274 871->872 873 6bac275-6bac29d 871->873 872->873
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BAC172), ref: 06BAC25F
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2579506160.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_6ba0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: e62d20f873e585e113a39b467d2c5da8aba5ab7bf17c3b828f8f0aa34f79f736
                                            • Instruction ID: e9c9c15a0634043815d5482438bdd39cd57670a768dc05f825c02b8548d713c4
                                            • Opcode Fuzzy Hash: e62d20f873e585e113a39b467d2c5da8aba5ab7bf17c3b828f8f0aa34f79f736
                                            • Instruction Fuzzy Hash: DD21ABB1D043698FDB14CFA9D8447DEBBF4EF48310F1484AAD814A7241D378A900CBA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 878 15170b0-151713c CheckRemoteDebuggerPresent 880 1517145-1517180 878->880 881 151713e-1517144 878->881 881->880
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0151712F
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 63f69a0e629ab8b373306cebb6c8ad23c726a2631262949cbc3d299be077f8c5
                                            • Instruction ID: 22667e4e8c0b04d652738d2a68628ecb9eb9082732da0b0878f4dda898c57439
                                            • Opcode Fuzzy Hash: 63f69a0e629ab8b373306cebb6c8ad23c726a2631262949cbc3d299be077f8c5
                                            • Instruction Fuzzy Hash: 092159B5D002598FDB14CF9AD544BEEBBF4FF48210F14841AE455B7650D7389944CF60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 884 15170b8-151713c CheckRemoteDebuggerPresent 886 1517145-1517180 884->886 887 151713e-1517144 884->887 887->886
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0151712F
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: 43a5cb6f31d4305821e10c72b5a27792f0817340fbc0d2cfda8107eee28709d4
                                            • Instruction ID: a001b4091b617cbf417c40a8efee249fb731b4ebc70a9d263fe80d2e6d56a6fa
                                            • Opcode Fuzzy Hash: 43a5cb6f31d4305821e10c72b5a27792f0817340fbc0d2cfda8107eee28709d4
                                            • Instruction Fuzzy Hash: 46214871C002598FDB14CF9AD444BEEBBF4EF49210F14841AE855A7240D778A944CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 890 151f018-151f0b4 DuplicateHandle 891 151f0b6-151f0bc 890->891 892 151f0bd-151f0da 890->892 891->892
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0151F0A7
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: ef3bd05bda8b0b74147eab8226cf0531f9780385c49067cf70e707bf44e51efe
                                            • Instruction ID: 49eb8ff645201810369571e4410e0455e867d0dbf59b46daff10634b1dc374be
                                            • Opcode Fuzzy Hash: ef3bd05bda8b0b74147eab8226cf0531f9780385c49067cf70e707bf44e51efe
                                            • Instruction Fuzzy Hash: 4721E4B5D002489FDB11CFAAD484AEEBFF5FB48310F14841AE919A7350C379A954CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 895 151f020-151f0b4 DuplicateHandle 896 151f0b6-151f0bc 895->896 897 151f0bd-151f0da 895->897 896->897
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0151F0A7
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 688271ef92024d068a2b0061ac6616fdb460cffb4247e949b40b8aaecd927419
                                            • Instruction ID: 2bebcab8f1d705dc19875f9b00637c4e5cd387a7ccffc52fb70b15fdd2df7036
                                            • Opcode Fuzzy Hash: 688271ef92024d068a2b0061ac6616fdb460cffb4247e949b40b8aaecd927419
                                            • Instruction Fuzzy Hash: 8E21F3B5D002489FDB10CFAAD884ADEFBF8FB48310F14841AE919A7350C379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 900 1518430-1518482 903 1518484-1518487 900->903 904 151848a-15184b5 DeleteFileW 900->904 903->904 905 15184b7-15184bd 904->905 906 15184be-15184e6 904->906 905->906
                                            APIs
                                            • DeleteFileW.KERNELBASE(00000000), ref: 015184A8
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 769734eeff8fd4575f18fc52db4ce20cac673bd7551d2f4b5e30cb11a090304f
                                            • Instruction ID: 2e1f598dd1483825659463e0438b0ffbd797c6f94382a8061e9e0a2218a81dd9
                                            • Opcode Fuzzy Hash: 769734eeff8fd4575f18fc52db4ce20cac673bd7551d2f4b5e30cb11a090304f
                                            • Instruction Fuzzy Hash: B62144B1C0065A9FDB24CF9AC845BDEFBF4FB48320F14812AD818A7240D778A941CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 909 1518438-1518482 911 1518484-1518487 909->911 912 151848a-15184b5 DeleteFileW 909->912 911->912 913 15184b7-15184bd 912->913 914 15184be-15184e6 912->914 913->914
                                            APIs
                                            • DeleteFileW.KERNELBASE(00000000), ref: 015184A8
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2555845105.0000000001510000.00000040.00000800.00020000.00000000.sdmp, Offset: 01510000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_1510000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 29ba6525c92f04ac45ca1ce5e656bca8573f6443c392254420a31bbf42542433
                                            • Instruction ID: 34504733cfad5d57fd94c38c417413415600ec853408b229bc518afe4e97de4e
                                            • Opcode Fuzzy Hash: 29ba6525c92f04ac45ca1ce5e656bca8573f6443c392254420a31bbf42542433
                                            • Instruction Fuzzy Hash: 221122B1C0065A9BDB24CF9AC444BDEFBF4FB48220F14852AD818AB640D778A940CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 917 6bab918-6bac26c GlobalMemoryStatusEx 922 6bac26e-6bac274 917->922 923 6bac275-6bac29d 917->923 922->923
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BAC172), ref: 06BAC25F
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2579506160.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_6ba0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 5df576589218e4f5ba2fd16a9cdd4c31e932bc865c9874a5ae279fc3fcc8e2be
                                            • Instruction ID: c2b72fec38cd31df051ea005a5b69dd2b64121301c4278fb85b5df6e57452ef9
                                            • Opcode Fuzzy Hash: 5df576589218e4f5ba2fd16a9cdd4c31e932bc865c9874a5ae279fc3fcc8e2be
                                            • Instruction Fuzzy Hash: 0311F2B1C046599BDB10CF9AC444BEEFBF4EB48210F10816AE918A7240D778A944CFE5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 926 6bac2a4-6bac2b1 928 6bac269-6bac26c 926->928 929 6bac2b3-6bac2b8 926->929 930 6bac26e-6bac274 928->930 931 6bac275-6bac29d 928->931 932 6bac24a-6bac265 GlobalMemoryStatusEx 929->932 933 6bac2ba-6bac2bf 929->933 930->931 932->928
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BAC172), ref: 06BAC25F
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2579506160.0000000006BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_6ba0000_jHJQWf.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: fab9f685891c1ea32b2ee00eac9f5a22bc3ba168b2e6ca43888868c7d74e83e6
                                            • Instruction ID: 69d1dda54b1b18ca5c6a66a1150a223b2685a124480e3e614065b087ca0952d9
                                            • Opcode Fuzzy Hash: fab9f685891c1ea32b2ee00eac9f5a22bc3ba168b2e6ca43888868c7d74e83e6
                                            • Instruction Fuzzy Hash: 3C01D1B2C0D3959FEB219FE9C4153DCBFA0EF06224F088196C484AB182D37D9549CBE6
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2552978670.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_129d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c43626d0c55385be4a07d009ac37f6613bdcce8330a592a0d3f495a4939c2e5
                                            • Instruction ID: a0a8beb3d06506da35ef06bb913af420bcd7acb5cae8ef25869343655656bdf5
                                            • Opcode Fuzzy Hash: 7c43626d0c55385be4a07d009ac37f6613bdcce8330a592a0d3f495a4939c2e5
                                            • Instruction Fuzzy Hash: 0F210071524308DFDF15DF98D9C0B26BBA1EB84314F20C56DD90A0B292C37AD447DA62
                                            Memory Dump Source
                                            • Source File: 00000010.00000002.2552978670.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_16_2_129d000_jHJQWf.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: 590e876979e9b5a39c4ad36c74801949706074814d3f1349462d6bca1804a51c
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: E811BB75504284CFCB12CF58D5C4B15BFA1FB84314F28C6AAD9494B656C33AD44ADB62

                                            Execution Graph

                                            Execution Coverage:10.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:156
                                            Total number of Limit Nodes:8
                                            execution_graph 22177 59c9e48 22178 59c9fd3 22177->22178 22180 59c9e6e 22177->22180 22180->22178 22181 59c5024 22180->22181 22182 59ca0c8 PostMessageW 22181->22182 22183 59ca134 22182->22183 22183->22180 22233 59c7068 22234 59c706e 22233->22234 22235 59c705f 22233->22235 22238 59c8c90 22234->22238 22254 59c8ca0 22234->22254 22239 59c8c99 22238->22239 22240 59c8cde 22239->22240 22270 59c95dc 22239->22270 22274 59c90e0 22239->22274 22279 59c9309 22239->22279 22284 59c99e8 22239->22284 22289 59c9392 22239->22289 22294 59c92b7 22239->22294 22299 59c9616 22239->22299 22304 59c91d6 22239->22304 22308 59c9435 22239->22308 22312 59c98bb 22239->22312 22317 59c957a 22239->22317 22322 59c9adf 22239->22322 22327 59c931e 22239->22327 22240->22235 22255 59c8cba 22254->22255 22256 59c8cde 22255->22256 22257 59c95dc 2 API calls 22255->22257 22258 59c931e 4 API calls 22255->22258 22259 59c9adf 2 API calls 22255->22259 22260 59c957a 2 API calls 22255->22260 22261 59c98bb 2 API calls 22255->22261 22262 59c9435 2 API calls 22255->22262 22263 59c91d6 2 API calls 22255->22263 22264 59c9616 2 API calls 22255->22264 22265 59c92b7 2 API calls 22255->22265 22266 59c9392 2 API calls 22255->22266 22267 59c99e8 2 API calls 22255->22267 22268 59c9309 2 API calls 22255->22268 22269 59c90e0 2 API calls 22255->22269 22256->22235 22257->22256 22258->22256 22259->22256 22260->22256 22261->22256 22262->22256 22263->22256 22264->22256 22265->22256 22266->22256 22267->22256 22268->22256 22269->22256 22336 59c6758 22270->22336 22340 59c6750 22270->22340 22271 59c9571 22275 59c90eb 22274->22275 22276 59c920c 22275->22276 22344 59c6b6d 22275->22344 22348 59c6b78 22275->22348 22276->22240 22280 59c92be 22279->22280 22352 59c6268 22280->22352 22356 59c6270 22280->22356 22281 59c92ea 22281->22240 22285 59c99f2 22284->22285 22360 59c68f0 22285->22360 22364 59c68e8 22285->22364 22286 59c9a16 22290 59c93b5 22289->22290 22292 59c68e8 WriteProcessMemory 22290->22292 22293 59c68f0 WriteProcessMemory 22290->22293 22291 59c9234 22291->22240 22292->22291 22293->22291 22295 59c92bd 22294->22295 22297 59c6268 ResumeThread 22295->22297 22298 59c6270 ResumeThread 22295->22298 22296 59c92ea 22296->22240 22297->22296 22298->22296 22300 59c95db 22299->22300 22301 59c9571 22299->22301 22302 59c6758 Wow64SetThreadContext 22300->22302 22303 59c6750 Wow64SetThreadContext 22300->22303 22302->22301 22303->22301 22306 59c6b6d CreateProcessA 22304->22306 22307 59c6b78 CreateProcessA 22304->22307 22305 59c920c 22305->22240 22306->22305 22307->22305 22310 59c6758 Wow64SetThreadContext 22308->22310 22311 59c6750 Wow64SetThreadContext 22308->22311 22309 59c9454 22310->22309 22311->22309 22313 59c98c4 22312->22313 22315 59c68e8 WriteProcessMemory 22313->22315 22316 59c68f0 WriteProcessMemory 22313->22316 22314 59c9a16 22315->22314 22316->22314 22318 59c959b 22317->22318 22319 59c9872 22318->22319 22320 59c68e8 WriteProcessMemory 22318->22320 22321 59c68f0 WriteProcessMemory 22318->22321 22319->22240 22320->22318 22321->22318 22368 59c69d8 22322->22368 22372 59c69e0 22322->22372 22323 59c997e 22323->22322 22324 59c9b72 22323->22324 22328 59c92cb 22327->22328 22329 59c932b 22327->22329 22328->22240 22376 59c6828 22329->22376 22380 59c6830 22329->22380 22330 59c9872 22330->22240 22331 59c9346 22331->22330 22332 59c68e8 WriteProcessMemory 22331->22332 22333 59c68f0 WriteProcessMemory 22331->22333 22332->22331 22333->22331 22337 59c679d Wow64SetThreadContext 22336->22337 22339 59c67e5 22337->22339 22339->22271 22341 59c679d Wow64SetThreadContext 22340->22341 22343 59c67e5 22341->22343 22343->22271 22345 59c6b79 CreateProcessA 22344->22345 22347 59c6dc3 22345->22347 22349 59c6c01 CreateProcessA 22348->22349 22351 59c6dc3 22349->22351 22353 59c6271 ResumeThread 22352->22353 22355 59c62e1 22353->22355 22355->22281 22357 59c62b0 ResumeThread 22356->22357 22359 59c62e1 22357->22359 22359->22281 22361 59c6938 WriteProcessMemory 22360->22361 22363 59c698f 22361->22363 22363->22286 22365 59c68f1 WriteProcessMemory 22364->22365 22367 59c698f 22365->22367 22367->22286 22369 59c6a2b ReadProcessMemory 22368->22369 22371 59c6a6f 22369->22371 22371->22323 22373 59c6a2b ReadProcessMemory 22372->22373 22375 59c6a6f 22373->22375 22375->22323 22377 59c6870 VirtualAllocEx 22376->22377 22379 59c68ad 22377->22379 22379->22331 22381 59c6870 VirtualAllocEx 22380->22381 22383 59c68ad 22381->22383 22383->22331 22184 24dd3d8 22185 24dd41e 22184->22185 22189 24dd5a8 22185->22189 22192 24dd5b8 22185->22192 22186 24dd50b 22195 24db730 22189->22195 22193 24dd5e6 22192->22193 22194 24db730 DuplicateHandle 22192->22194 22193->22186 22194->22193 22196 24dd620 DuplicateHandle 22195->22196 22197 24dd5e6 22196->22197 22197->22186 22212 24d4668 22213 24d467a 22212->22213 22214 24d4686 22213->22214 22216 24d4778 22213->22216 22217 24d479d 22216->22217 22221 24d4878 22217->22221 22225 24d4888 22217->22225 22218 24d47a7 22218->22214 22222 24d4882 22221->22222 22224 24d498c 22222->22224 22229 24d44e4 22222->22229 22224->22218 22226 24d48af 22225->22226 22227 24d44e4 CreateActCtxA 22226->22227 22228 24d498c 22226->22228 22227->22228 22228->22218 22230 24d5918 CreateActCtxA 22229->22230 22232 24d59db 22230->22232 22232->22232 22198 24dac50 22199 24dac5f 22198->22199 22202 24dad48 22198->22202 22207 24dad37 22198->22207 22203 24dad59 22202->22203 22204 24dad7c 22202->22204 22203->22204 22205 24daf80 GetModuleHandleW 22203->22205 22204->22199 22206 24dafad 22205->22206 22206->22199 22208 24dad7c 22207->22208 22209 24dad59 22207->22209 22208->22199 22209->22208 22210 24daf80 GetModuleHandleW 22209->22210 22211 24dafad 22210->22211 22211->22199

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 59c6b6d-59c6c0d 3 59c6c0f-59c6c19 0->3 4 59c6c46-59c6c66 0->4 3->4 5 59c6c1b-59c6c1d 3->5 9 59c6c9f-59c6cce 4->9 10 59c6c68-59c6c72 4->10 7 59c6c1f-59c6c29 5->7 8 59c6c40-59c6c43 5->8 11 59c6c2d-59c6c3c 7->11 12 59c6c2b 7->12 8->4 20 59c6d07-59c6dc1 CreateProcessA 9->20 21 59c6cd0-59c6cda 9->21 10->9 13 59c6c74-59c6c76 10->13 11->11 14 59c6c3e 11->14 12->11 15 59c6c78-59c6c82 13->15 16 59c6c99-59c6c9c 13->16 14->8 18 59c6c84 15->18 19 59c6c86-59c6c95 15->19 16->9 18->19 19->19 22 59c6c97 19->22 32 59c6dca-59c6e50 20->32 33 59c6dc3-59c6dc9 20->33 21->20 23 59c6cdc-59c6cde 21->23 22->16 25 59c6ce0-59c6cea 23->25 26 59c6d01-59c6d04 23->26 27 59c6cec 25->27 28 59c6cee-59c6cfd 25->28 26->20 27->28 28->28 29 59c6cff 28->29 29->26 43 59c6e60-59c6e64 32->43 44 59c6e52-59c6e56 32->44 33->32 46 59c6e74-59c6e78 43->46 47 59c6e66-59c6e6a 43->47 44->43 45 59c6e58 44->45 45->43 49 59c6e88-59c6e8c 46->49 50 59c6e7a-59c6e7e 46->50 47->46 48 59c6e6c 47->48 48->46 51 59c6e9e-59c6ea5 49->51 52 59c6e8e-59c6e94 49->52 50->49 53 59c6e80 50->53 54 59c6ebc 51->54 55 59c6ea7-59c6eb6 51->55 52->51 53->49 57 59c6ebd 54->57 55->54 57->57
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 059C6DAE
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 855675a02ba5c001cd489f71123418b5a176b002e86de1c427ed04f9772d1875
                                            • Instruction ID: 8224ff2accf458d3e9613197830d518057084dff43d2554aa79e88467bda1505
                                            • Opcode Fuzzy Hash: 855675a02ba5c001cd489f71123418b5a176b002e86de1c427ed04f9772d1875
                                            • Instruction Fuzzy Hash: 7B916D71D00219DFDB24CFA9C844BEDBBB6FF49310F0481AAE819A7240DB759985CF92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 58 59c6b78-59c6c0d 60 59c6c0f-59c6c19 58->60 61 59c6c46-59c6c66 58->61 60->61 62 59c6c1b-59c6c1d 60->62 66 59c6c9f-59c6cce 61->66 67 59c6c68-59c6c72 61->67 64 59c6c1f-59c6c29 62->64 65 59c6c40-59c6c43 62->65 68 59c6c2d-59c6c3c 64->68 69 59c6c2b 64->69 65->61 77 59c6d07-59c6dc1 CreateProcessA 66->77 78 59c6cd0-59c6cda 66->78 67->66 70 59c6c74-59c6c76 67->70 68->68 71 59c6c3e 68->71 69->68 72 59c6c78-59c6c82 70->72 73 59c6c99-59c6c9c 70->73 71->65 75 59c6c84 72->75 76 59c6c86-59c6c95 72->76 73->66 75->76 76->76 79 59c6c97 76->79 89 59c6dca-59c6e50 77->89 90 59c6dc3-59c6dc9 77->90 78->77 80 59c6cdc-59c6cde 78->80 79->73 82 59c6ce0-59c6cea 80->82 83 59c6d01-59c6d04 80->83 84 59c6cec 82->84 85 59c6cee-59c6cfd 82->85 83->77 84->85 85->85 86 59c6cff 85->86 86->83 100 59c6e60-59c6e64 89->100 101 59c6e52-59c6e56 89->101 90->89 103 59c6e74-59c6e78 100->103 104 59c6e66-59c6e6a 100->104 101->100 102 59c6e58 101->102 102->100 106 59c6e88-59c6e8c 103->106 107 59c6e7a-59c6e7e 103->107 104->103 105 59c6e6c 104->105 105->103 108 59c6e9e-59c6ea5 106->108 109 59c6e8e-59c6e94 106->109 107->106 110 59c6e80 107->110 111 59c6ebc 108->111 112 59c6ea7-59c6eb6 108->112 109->108 110->106 114 59c6ebd 111->114 112->111 114->114
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 059C6DAE
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: a5ac140b1050c9a82569bee02ed6188de7576d17c9a536ed2f65d3e4f8a97b00
                                            • Instruction ID: b76a5b15594350a9abd38f46cc70e0000bba0086a1d7d005404f7ffbd971fab0
                                            • Opcode Fuzzy Hash: a5ac140b1050c9a82569bee02ed6188de7576d17c9a536ed2f65d3e4f8a97b00
                                            • Instruction Fuzzy Hash: 2E915C71D00619DFDB24CFA9C844BEDBBB6FF49300F0481AAE819A7240DB759985CF92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 115 24dad48-24dad57 116 24dad59-24dad66 call 24da0a0 115->116 117 24dad83-24dad87 115->117 123 24dad7c 116->123 124 24dad68 116->124 119 24dad89-24dad93 117->119 120 24dad9b-24daddc 117->120 119->120 126 24dadde-24dade6 120->126 127 24dade9-24dadf7 120->127 123->117 172 24dad6e call 24dafd0 124->172 173 24dad6e call 24dafe0 124->173 126->127 128 24dadf9-24dadfe 127->128 129 24dae1b-24dae1d 127->129 131 24dae09 128->131 132 24dae00-24dae07 call 24da0ac 128->132 134 24dae20-24dae27 129->134 130 24dad74-24dad76 130->123 133 24daeb8-24daf34 130->133 136 24dae0b-24dae19 131->136 132->136 165 24daf36-24daf5e 133->165 166 24daf60-24daf78 133->166 137 24dae29-24dae31 134->137 138 24dae34-24dae3b 134->138 136->134 137->138 141 24dae3d-24dae45 138->141 142 24dae48-24dae4a call 24da0bc 138->142 141->142 144 24dae4f-24dae51 142->144 146 24dae5e-24dae63 144->146 147 24dae53-24dae5b 144->147 148 24dae65-24dae6c 146->148 149 24dae81-24dae8e 146->149 147->146 148->149 151 24dae6e-24dae7e call 24da0cc call 24da0dc 148->151 156 24daeb1-24daeb7 149->156 157 24dae90-24daeae 149->157 151->149 157->156 165->166 167 24daf7a-24daf7d 166->167 168 24daf80-24dafab GetModuleHandleW 166->168 167->168 169 24dafad-24dafb3 168->169 170 24dafb4-24dafc8 168->170 169->170 172->130 173->130
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 024DAF9E
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 6fb24537fb7d0805f19617a53b991be8b83626799ea872914b5b409c2d18a8b3
                                            • Instruction ID: 09f0efd29b8a6251ad4116c50c68a47af83a15cf7b484ef49b268138006f6db2
                                            • Opcode Fuzzy Hash: 6fb24537fb7d0805f19617a53b991be8b83626799ea872914b5b409c2d18a8b3
                                            • Instruction Fuzzy Hash: FD812570A00B158FDB24DF6AD05575ABBF1FF88304F04892ED48A9BB50DB75E846CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 174 24d590d-24d5916 175 24d5918-24d59d9 CreateActCtxA 174->175 177 24d59db-24d59e1 175->177 178 24d59e2-24d5a3c 175->178 177->178 185 24d5a3e-24d5a41 178->185 186 24d5a4b-24d5a4f 178->186 185->186 187 24d5a51-24d5a5d 186->187 188 24d5a60 186->188 187->188 190 24d5a61 188->190 190->190
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 024D59C9
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: e7fdeef5105fde780fe2683e86543fe67f40d8a26b00b568f162321d00e42e9e
                                            • Instruction ID: a1a9bf2aaa1812f7f1e85c58c1683ebb10f1b4bf3dabe32d981e11a5dbd90998
                                            • Opcode Fuzzy Hash: e7fdeef5105fde780fe2683e86543fe67f40d8a26b00b568f162321d00e42e9e
                                            • Instruction Fuzzy Hash: 9341B271C00719CFEB24CFA9C88479EBBB5FF49304F60856AD408AB251DB75694ACF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 191 24d44e4-24d59d9 CreateActCtxA 194 24d59db-24d59e1 191->194 195 24d59e2-24d5a3c 191->195 194->195 202 24d5a3e-24d5a41 195->202 203 24d5a4b-24d5a4f 195->203 202->203 204 24d5a51-24d5a5d 203->204 205 24d5a60 203->205 204->205 207 24d5a61 205->207 207->207
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 024D59C9
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 7c368db2163b8239c56310e8c60a738f903c0e0ff04833d73424fa1e147f50f5
                                            • Instruction ID: a5d823eda3b6c0ead609f0ef758d1a017e102b53dce0518f56a7d01a3125a604
                                            • Opcode Fuzzy Hash: 7c368db2163b8239c56310e8c60a738f903c0e0ff04833d73424fa1e147f50f5
                                            • Instruction Fuzzy Hash: 8E41A271C00729CFEB24DFA9C844B9EBBB5FF49304F60805AD419AB251DB75694ACF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 208 24dd6e1-24dd6e8 209 24dd6ea-24dd80e 208->209 210 24dd6a4-24dd6b4 DuplicateHandle 208->210 211 24dd6bd-24dd6da 210->211 212 24dd6b6-24dd6bc 210->212 212->211
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024DD5E6,?,?,?,?,?), ref: 024DD6A7
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: c24fc7c6f10c82412a222de0882601bb603fcc778c498f61461925ac289367cb
                                            • Instruction ID: 8e63309f95ff2c225f91daf6e88532fc043e99cef59551e80caf14d26ecae80b
                                            • Opcode Fuzzy Hash: c24fc7c6f10c82412a222de0882601bb603fcc778c498f61461925ac289367cb
                                            • Instruction Fuzzy Hash: 5E31C2746403809FE701EF60E465B697BB1F788714F11852AEA118B3E5EABC9C56CF20

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 227 59c68e8-59c693e 230 59c694e-59c698d WriteProcessMemory 227->230 231 59c6940-59c694c 227->231 233 59c698f-59c6995 230->233 234 59c6996-59c69c6 230->234 231->230 233->234
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 059C6980
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: f0b2a6afae1be58a343c9c06dd0b5b43b9970f5c96f3ebc48b2b9756506b91f8
                                            • Instruction ID: 5116666d3cbf589e139adebd8be63ce55f5d183e68d07ce37261f0f39f44dc5e
                                            • Opcode Fuzzy Hash: f0b2a6afae1be58a343c9c06dd0b5b43b9970f5c96f3ebc48b2b9756506b91f8
                                            • Instruction Fuzzy Hash: 9E2128759003599FDB10DFAAC841BDEBBF5FF48310F10842AE959AB250C7799940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 238 59c68f0-59c693e 240 59c694e-59c698d WriteProcessMemory 238->240 241 59c6940-59c694c 238->241 243 59c698f-59c6995 240->243 244 59c6996-59c69c6 240->244 241->240 243->244
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 059C6980
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: d26cf97879aaf25d4fe459c818421ee72a4b14107093358abcf236120c43a1b8
                                            • Instruction ID: 322d72c9e991fbc04bedc228b06b99cb1db269fae563894ebbe424735f8c46c7
                                            • Opcode Fuzzy Hash: d26cf97879aaf25d4fe459c818421ee72a4b14107093358abcf236120c43a1b8
                                            • Instruction Fuzzy Hash: 442125759003499FDB10CFAAC880BEEBBF5FF48310F10842EE959AB240C7799940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 248 24db730-24dd6b4 DuplicateHandle 250 24dd6bd-24dd6da 248->250 251 24dd6b6-24dd6bc 248->251 251->250
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024DD5E6,?,?,?,?,?), ref: 024DD6A7
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: bbe5bf2cf2a97792410499d54640fca6b1a65bc0aa6a205b7772274885c5a631
                                            • Instruction ID: 6eac1ae2ffe97af9491eba52e13065d3059438ed3c8449218b0414571e13a8f4
                                            • Opcode Fuzzy Hash: bbe5bf2cf2a97792410499d54640fca6b1a65bc0aa6a205b7772274885c5a631
                                            • Instruction Fuzzy Hash: E321E4B5D00248EFDB10CF9AD584ADEFBF4EB48710F14801AE918A7350D778A950CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 254 24dd619-24dd6b4 DuplicateHandle 255 24dd6bd-24dd6da 254->255 256 24dd6b6-24dd6bc 254->256 256->255
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024DD5E6,?,?,?,?,?), ref: 024DD6A7
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 5e33a9855c7e21408b141b995395c9adebe9f79a98ba484c2e434ee24a783115
                                            • Instruction ID: 4618282679aef89a5cfc78831ecbe6263a21f300f2d457d82339812af04ece94
                                            • Opcode Fuzzy Hash: 5e33a9855c7e21408b141b995395c9adebe9f79a98ba484c2e434ee24a783115
                                            • Instruction Fuzzy Hash: C621E2B5D00248EFDB10CFAAD584ADEBBF5EB48310F14802AE958A7350C379A945CFA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 259 59c6758-59c67a3 261 59c67a5-59c67b1 259->261 262 59c67b3-59c67e3 Wow64SetThreadContext 259->262 261->262 264 59c67ec-59c681c 262->264 265 59c67e5-59c67eb 262->265 265->264
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 059C67D6
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 4a75cde79fb96470dddc24c1ffb47e3997d00a6656cabbbe113dc1c5403bbe9f
                                            • Instruction ID: 15d4fad8070915b19fd7841ff00ec4d9c91be8d5eef6f1f42c33230e23fe0589
                                            • Opcode Fuzzy Hash: 4a75cde79fb96470dddc24c1ffb47e3997d00a6656cabbbe113dc1c5403bbe9f
                                            • Instruction Fuzzy Hash: 79210475D003099FDB14DFAAC485BEEBBF4EF88220F14842ED559A7240CB78A945CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 269 59c69d8-59c6a6d ReadProcessMemory 272 59c6a6f-59c6a75 269->272 273 59c6a76-59c6aa6 269->273 272->273
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 059C6A60
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 6cd95287c5f66939a73960a6e4b865115310afcd6f1a650cc7d0de1bcf6246e7
                                            • Instruction ID: 953f191b182f6dcb1cee7a6ae83a2afa359b9a24013649cb228094bbed24866e
                                            • Opcode Fuzzy Hash: 6cd95287c5f66939a73960a6e4b865115310afcd6f1a650cc7d0de1bcf6246e7
                                            • Instruction Fuzzy Hash: 162105B5C003499FDB14CFAAC981BEEBBF5FF48310F10842AE919A7250D7389944CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 277 59c69e0-59c6a6d ReadProcessMemory 280 59c6a6f-59c6a75 277->280 281 59c6a76-59c6aa6 277->281 280->281
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 059C6A60
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 355f9e6dca5bde5014a7f65a2e3356f932e028de32818653961a39eda5e1862e
                                            • Instruction ID: 4277d8cee18a6eb9ff3e58536dbd5ebf684aa0dbd0c4c15efa1102f4dd2451c3
                                            • Opcode Fuzzy Hash: 355f9e6dca5bde5014a7f65a2e3356f932e028de32818653961a39eda5e1862e
                                            • Instruction Fuzzy Hash: A021E3718003599FDB14DFAAC880BEEBBF5FF48310F50842AE959A7250DB799940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 285 59c6750-59c67a3 287 59c67a5-59c67b1 285->287 288 59c67b3-59c67e3 Wow64SetThreadContext 285->288 287->288 290 59c67ec-59c681c 288->290 291 59c67e5-59c67eb 288->291 291->290
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 059C67D6
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 7e2769c7674a6ad989bba306d3315104998bcb1e80c8c051f40dc4a7c26eaf51
                                            • Instruction ID: c8917a7d7b94b4cd49248d144b06c2cd7784b29615b0116f8d90639697574cf5
                                            • Opcode Fuzzy Hash: 7e2769c7674a6ad989bba306d3315104998bcb1e80c8c051f40dc4a7c26eaf51
                                            • Instruction Fuzzy Hash: 3F213475D003488FDB14CFAAC485BEEBBF4EF48210F14882ED559A7640CB789A45CFA5
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059C689E
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 8ad038943d3143300515e2ef6160fef7a7809ae6ab92208b9e01f9d711cc0ceb
                                            • Instruction ID: 095e5082fbaa16e94e2379934b4021e823c3d570d3227bc3093aa412804cce33
                                            • Opcode Fuzzy Hash: 8ad038943d3143300515e2ef6160fef7a7809ae6ab92208b9e01f9d711cc0ceb
                                            • Instruction Fuzzy Hash: F91126758003489FDB24DFAAC844BDEBBF5EF88310F14841AE919A7250CB799940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 295 59c6828-59c68ab VirtualAllocEx 298 59c68ad-59c68b3 295->298 299 59c68b4-59c68d9 295->299 298->299
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059C689E
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: ec523abd4141a2e4ac5c9ae6ac0abe202a4e093f5dd38a9247cd56361672d36e
                                            • Instruction ID: e50bde57fb6bc383f3a86935b401aacfab0193eb13248535020e9b00bab554d5
                                            • Opcode Fuzzy Hash: ec523abd4141a2e4ac5c9ae6ac0abe202a4e093f5dd38a9247cd56361672d36e
                                            • Instruction Fuzzy Hash: FB1126769003489FDF24DFAAC845BDEBFF5EF48310F14881AE959A7250CB799940CBA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: f54549790345e00795cc9cb4e5d37e3b9040508228972d7f816ff1e1543c2bbb
                                            • Instruction ID: 91b8bb21236ee5b872f0b500344f7786960e296a995a660e16b916891187a6f8
                                            • Opcode Fuzzy Hash: f54549790345e00795cc9cb4e5d37e3b9040508228972d7f816ff1e1543c2bbb
                                            • Instruction Fuzzy Hash: A0112875D007488FDB24DFAAC4447DEBBF5EF88320F14841ED559A7240CB799940CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 4045a59c0d332187b5f4bff8edf6701f2f790fa060cc9103cedf5f8c6f861f41
                                            • Instruction ID: 63ff0972ce5962673916a24efff10f1498bb412fd1dc4a43e997203603945d3d
                                            • Opcode Fuzzy Hash: 4045a59c0d332187b5f4bff8edf6701f2f790fa060cc9103cedf5f8c6f861f41
                                            • Instruction Fuzzy Hash: D1113671D003488FDB24DFAAC444BDEFBF5EF88220F24841ED559A7240CB79A940CBA5
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 024DAF9E
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444617723.00000000024D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_24d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 479f14402e46b9dffffd301328685406ec08440be9d2f275915c7ec7b9acdc16
                                            • Instruction ID: dae8e9a71980f3110234babd45fc12e26749c84424b0760a10a8821d0d8c1d24
                                            • Opcode Fuzzy Hash: 479f14402e46b9dffffd301328685406ec08440be9d2f275915c7ec7b9acdc16
                                            • Instruction Fuzzy Hash: 4B111DB6C006598FCB20CF9AC444BDEFBF4EF88224F10846AD829A7710C379A545CFA5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 059CA125
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 142c7e0c0a691047c4b64a1d244d74d23aaf3b140b0ec26081094f406e0980ff
                                            • Instruction ID: 178562b797c80f86dc624af9ad1b7658e31070ed1420f4f9a6dae5befbf67e40
                                            • Opcode Fuzzy Hash: 142c7e0c0a691047c4b64a1d244d74d23aaf3b140b0ec26081094f406e0980ff
                                            • Instruction Fuzzy Hash: 5A11F2B580074C9FDB20CF9AC944BDEBFF8EB48314F10845AE918A7650C379A944CFA5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 059CA125
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1449569160.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_59c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 6016ce9787f2e383830a2423eeb0e99d96facb20acbaae92ce7443f67e787688
                                            • Instruction ID: 3fa0cb4af090cf37216cef16e8e714dca28eb5ad49a1d8f1da8372cc7203e2ac
                                            • Opcode Fuzzy Hash: 6016ce9787f2e383830a2423eeb0e99d96facb20acbaae92ce7443f67e787688
                                            • Instruction Fuzzy Hash: E41100B5800348DFDB20CF9AD984BDEBBF8FB48324F10841AE518A7650C379A944CFA5
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444283412.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_ccd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b010d25de5e87486db4363b7c81dad82cdb412e2a49fcd6ff20e77dc4996ec63
                                            • Instruction ID: 98dda973e9aef7d333ba32c2b268211ea8e20002af8b0ebb17cd2953e227a403
                                            • Opcode Fuzzy Hash: b010d25de5e87486db4363b7c81dad82cdb412e2a49fcd6ff20e77dc4996ec63
                                            • Instruction Fuzzy Hash: 1421FFB2500240DFDB15DF14D9C0F26BB65FB88318F2085BDE90A0B656C336D956DAA2
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444336133.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_cdd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6571a8eab5bfc8b8a3fe7ad68296a32e186dc44e6ed7da5ed336416ab7d3e169
                                            • Instruction ID: 5d0b660329910260baae557711a69fe429018b2e93b605bd2799a15145a30131
                                            • Opcode Fuzzy Hash: 6571a8eab5bfc8b8a3fe7ad68296a32e186dc44e6ed7da5ed336416ab7d3e169
                                            • Instruction Fuzzy Hash: 1121F571904304DFDB14DF14D9C0B16BB65EBC4314F24C56EDA0A4B396C33AE847CA62
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444336133.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_cdd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fefd96c65c6182f17764302a5b0c9f1f68f4e294ef3a5908c32272138234ab64
                                            • Instruction ID: 9a852974d570f929c2244ba834eb61b7be9ce87bb64ff88455b0f1613259fd42
                                            • Opcode Fuzzy Hash: fefd96c65c6182f17764302a5b0c9f1f68f4e294ef3a5908c32272138234ab64
                                            • Instruction Fuzzy Hash: 5321B071904204AFDB15DF54D9C0B26BBA5FB84314F24C5AEEA4A4B792C33ADC46CA61
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444336133.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_cdd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea7882f408df12d1269cec8ca58a3b41e82c6a7a05fa8894fcab3958b9a317b0
                                            • Instruction ID: d19c053f32740d13dfdf784d4b033025dd7d42e30f10dcb1c9c18eb54d1f1d33
                                            • Opcode Fuzzy Hash: ea7882f408df12d1269cec8ca58a3b41e82c6a7a05fa8894fcab3958b9a317b0
                                            • Instruction Fuzzy Hash: 8E218E755093808FCB12CF24D990715BF71EB86314F28C5EBD9498F6A7C33A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444283412.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_ccd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction ID: 0d9a4de46913f3c0107907a1a4695d50566c242240a52d45ded176aa29cacacd
                                            • Opcode Fuzzy Hash: 5f425b5cd1c464f0a4a5253a28fe3054bde847c9d27b32d63737858cb099eba0
                                            • Instruction Fuzzy Hash: 0B11D3B6504280CFCB15CF10D9C4B16BF71FB94318F24C6ADD84A0B656C336D956CBA1
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444336133.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_cdd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: 1bafd62294cc6f26c5616109b6a59bec85dc0d0aa60f45f1e6a797d456d29401
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: F211BB75904280DFCB11CF10D5C0B15FBB1FB84314F24C6AAD94A4B796C33AD84ACB61
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444283412.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_ccd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0186115e58b76a96c3328d7a68c08bca0487be8a256f0dabb9ccb949f7316f2
                                            • Instruction ID: 44aebad748da1ca8265bb960208271d954cbc401ab3e167f5dff8fa83bf313b5
                                            • Opcode Fuzzy Hash: e0186115e58b76a96c3328d7a68c08bca0487be8a256f0dabb9ccb949f7316f2
                                            • Instruction Fuzzy Hash: 8A01DB31404744AEE7205B16DD84F66FBE8DF41320F18856EED1A4F28AC77D9840CB75
                                            Memory Dump Source
                                            • Source File: 00000011.00000002.1444283412.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_17_2_ccd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c0163e34f196adda56560780e783d684cce4333894dc8fd95f2a17c5173dd212
                                            • Instruction ID: 1fc3c424713af328391ff9dae7c57670a3068bdb5d5e7484fcfea3eceb27c31c
                                            • Opcode Fuzzy Hash: c0163e34f196adda56560780e783d684cce4333894dc8fd95f2a17c5173dd212
                                            • Instruction Fuzzy Hash: BDF0C231404344AEE7208A06DC84B62FFA8EF51724F18C45EED194F286C3799840CBB5

                                            Execution Graph

                                            Execution Coverage:10.5%
                                            Dynamic/Decrypted Code Coverage:58.3%
                                            Signature Coverage:0%
                                            Total number of Nodes:24
                                            Total number of Limit Nodes:4
                                            execution_graph 24391 2d6eef8 DuplicateHandle 24392 2d6ef8e 24391->24392 24393 2d670b8 24394 2d670fc CheckRemoteDebuggerPresent 24393->24394 24395 2d6713e 24394->24395 24396 2d60848 24398 2d6084e 24396->24398 24397 2d6091b 24398->24397 24400 2d61380 24398->24400 24402 2d61383 24400->24402 24401 2d614ba 24401->24398 24402->24401 24404 2d684f0 24402->24404 24405 2d684fa 24404->24405 24406 2d68514 24405->24406 24409 6abb2f8 24405->24409 24414 6abb308 24405->24414 24406->24402 24410 6abb31d 24409->24410 24411 6abb532 24410->24411 24412 6abb8f6 GlobalMemoryStatusEx 24410->24412 24413 6abb950 GlobalMemoryStatusEx 24410->24413 24411->24406 24412->24410 24413->24410 24416 6abb31d 24414->24416 24415 6abb532 24415->24406 24416->24415 24417 6abb950 GlobalMemoryStatusEx 24416->24417 24418 6abb8f6 GlobalMemoryStatusEx 24416->24418 24417->24416 24418->24416

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 227 6abc110-6abc12b 228 6abc12d-6abc154 call 6abb8e8 227->228 229 6abc155-6abc174 call 6abb8f4 227->229 235 6abc17a-6abc1d9 229->235 236 6abc176-6abc179 229->236 242 6abc1db-6abc1de 235->242 243 6abc1df-6abc26c GlobalMemoryStatusEx 235->243 246 6abc26e-6abc274 243->246 247 6abc275-6abc29d 243->247 246->247
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1533331904.0000000006AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_6ab0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2281c8779971737598cf372dd05bda34a8d3f2f5499fdaefa60e880a92258c43
                                            • Instruction ID: e75a6968d16c5a40d630d617f3a59e6b83ab6a022656c2eba1eb91ee01e71523
                                            • Opcode Fuzzy Hash: 2281c8779971737598cf372dd05bda34a8d3f2f5499fdaefa60e880a92258c43
                                            • Instruction Fuzzy Hash: F24106B2D043568FDB14DFA5E8007DEBBB5AF89310F19856BC415EB252DB349841CBD0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 250 2d670b0-2d6713c CheckRemoteDebuggerPresent 252 2d67145-2d67180 250->252 253 2d6713e-2d67144 250->253 253->252
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02D6712F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1513428237.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_2d60000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: b5305f38b1b34e2a402dd7fbdf5f32418a61315edda779427919b3c1e79c6dfc
                                            • Instruction ID: fdca99f1513d49f2fb3a937ef8ea3e705a7739cfcdf66377659fe5d318f4c9a4
                                            • Opcode Fuzzy Hash: b5305f38b1b34e2a402dd7fbdf5f32418a61315edda779427919b3c1e79c6dfc
                                            • Instruction Fuzzy Hash: 0F2175B2D002198FDB14CFAAD984BEEFBF4EF48224F14841AE858A3340C7389944CF60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 256 2d670b8-2d6713c CheckRemoteDebuggerPresent 258 2d67145-2d67180 256->258 259 2d6713e-2d67144 256->259 259->258
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02D6712F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1513428237.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_2d60000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: dc57f7df5038c54da41011f2ef3900672140c1e97a3d02e74735d64c91a698f3
                                            • Instruction ID: e0ef75ce9a62655e635c6766eca7354704f31a195bdd55fcedc1525dde3e5057
                                            • Opcode Fuzzy Hash: dc57f7df5038c54da41011f2ef3900672140c1e97a3d02e74735d64c91a698f3
                                            • Instruction Fuzzy Hash: 772145B29002598FDB10CF9AD884BEEFBF4EF48224F14841AE858A3340D778A944CF60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 262 2d6eef0-2d6ef8c DuplicateHandle 263 2d6ef95-2d6efb2 262->263 264 2d6ef8e-2d6ef94 262->264 264->263
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D6EF7F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1513428237.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_2d60000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 6b13bfa1ba0039a43252dbce5254334ee11313625418811205688f2d55e760c0
                                            • Instruction ID: 02489e1cd04b7d6d62b2890179b5c616a8cc578c8c0f763647f3609044553c07
                                            • Opcode Fuzzy Hash: 6b13bfa1ba0039a43252dbce5254334ee11313625418811205688f2d55e760c0
                                            • Instruction Fuzzy Hash: 8121E4B5D002489FDB10CF9AD584AEEBBF5EB48310F14801AE959A7350D379A954CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 267 2d6eef8-2d6ef8c DuplicateHandle 268 2d6ef95-2d6efb2 267->268 269 2d6ef8e-2d6ef94 267->269 269->268
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D6EF7F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1513428237.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_2d60000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 7cef867eca43e8d058b8ca1c538c9b0e93115db837f654037203dd17fa164cdd
                                            • Instruction ID: d73f99da33c30dd93dce06a35e8b0892355eecb399442466107198a3f26a2122
                                            • Opcode Fuzzy Hash: 7cef867eca43e8d058b8ca1c538c9b0e93115db837f654037203dd17fa164cdd
                                            • Instruction Fuzzy Hash: F621C4B5D002489FDB10CF9AD984AEEBBF5EB48310F14841AE958A7350D379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 272 6abc1f8-6abc236 273 6abc23e-6abc26c GlobalMemoryStatusEx 272->273 274 6abc26e-6abc274 273->274 275 6abc275-6abc29d 273->275 274->275
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE ref: 06ABC25F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1533331904.0000000006AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_6ab0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: a66df68e9b52cdaee95f6633e04cf3f6e50fa980d062674dcae1eddced028b97
                                            • Instruction ID: 3bfa6fc0d4b38edf2e5284f622ac329695f98ca275a04e95167ab928446c5824
                                            • Opcode Fuzzy Hash: a66df68e9b52cdaee95f6633e04cf3f6e50fa980d062674dcae1eddced028b97
                                            • Instruction Fuzzy Hash: 9B1123B1C006599FCB10DF9AD444BDEFBF4EF48320F10816AD818A7241D778A944CFA5
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1512969480.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_141d000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 260fd357c7a824321ac1be912deb4f6f4fce1861d1b2a5bba01f5ce2ecf94aba
                                            • Instruction ID: db3c84e6a0c7d7c72a004f397bcb9c6e878309e60cd8e3447b72340481861f08
                                            • Opcode Fuzzy Hash: 260fd357c7a824321ac1be912deb4f6f4fce1861d1b2a5bba01f5ce2ecf94aba
                                            • Instruction Fuzzy Hash: C23189B15093C48FCB13CF64C894701BF71AB46214F29C5DBD9898F2A7C23A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.1512969480.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_141d000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b37a33ca21c0b9cbecd34a24d563563b7c6cea30d80d9e312bcc583b99402448
                                            • Instruction ID: 39cb0959db9eef103075429e3e022b6e93f87f0006b92995d4f586abfc977ea9
                                            • Opcode Fuzzy Hash: b37a33ca21c0b9cbecd34a24d563563b7c6cea30d80d9e312bcc583b99402448
                                            • Instruction Fuzzy Hash: 2A2103F1904204DFDB15DF94D984B16BF61EB84318F20C56ED80A0B36AC33AD447CA62

                                            Execution Graph

                                            Execution Coverage:10.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:241
                                            Total number of Limit Nodes:15
                                            execution_graph 46360 5695848 46361 56958a1 46360->46361 46366 5695908 46361->46366 46374 30682aa 46361->46374 46380 3065cec 46361->46380 46362 56958da 46367 569590d 46366->46367 46368 5695913 46367->46368 46386 5695fa0 46367->46386 46391 5695f90 46367->46391 46368->46362 46369 56959ad 46396 5694d60 GetSystemMetrics GetSystemMetrics 46369->46396 46371 56959b8 46371->46362 46375 30682b8 46374->46375 46377 306856b 46375->46377 46414 306ac1a 46375->46414 46376 30685a9 46376->46362 46377->46376 46418 306cd00 46377->46418 46381 3065cf7 46380->46381 46383 306856b 46381->46383 46384 306ac1a GetModuleHandleW 46381->46384 46382 30685a9 46382->46362 46383->46382 46385 306cd00 GetModuleHandleW 46383->46385 46384->46383 46385->46382 46388 5695fc1 46386->46388 46387 5695fd6 46387->46369 46388->46387 46397 5694434 46388->46397 46390 5696041 46390->46390 46392 5695f9b 46391->46392 46393 5694434 DrawTextExW 46392->46393 46394 5695fd6 46392->46394 46395 5696041 46393->46395 46394->46369 46396->46371 46399 569443f 46397->46399 46398 5697c09 46398->46390 46399->46398 46403 5698770 46399->46403 46407 5698780 46399->46407 46400 5697d1c 46400->46390 46404 5698780 46403->46404 46410 5697024 46404->46410 46408 5697024 DrawTextExW 46407->46408 46409 569879d 46408->46409 46409->46400 46411 56987b8 DrawTextExW 46410->46411 46413 569879d 46411->46413 46413->46400 46423 306ac40 46414->46423 46427 306ac50 46414->46427 46415 306ac2e 46415->46377 46419 306cd31 46418->46419 46420 306cd55 46419->46420 46435 306cec0 46419->46435 46439 306ceb1 46419->46439 46420->46376 46424 306ac50 46423->46424 46430 306ad48 46424->46430 46425 306ac5f 46425->46415 46429 306ad48 GetModuleHandleW 46427->46429 46428 306ac5f 46428->46415 46429->46428 46431 306ad59 46430->46431 46432 306ad7c 46430->46432 46431->46432 46433 306af80 GetModuleHandleW 46431->46433 46432->46425 46434 306afad 46433->46434 46434->46425 46436 306cecd 46435->46436 46438 306cf07 46436->46438 46443 306b720 46436->46443 46438->46420 46440 306cecd 46439->46440 46441 306cf07 46440->46441 46442 306b720 GetModuleHandleW 46440->46442 46441->46420 46442->46441 46444 306b72b 46443->46444 46446 306dc18 46444->46446 46447 306d024 46444->46447 46446->46446 46448 306d02f 46447->46448 46449 3065cec GetModuleHandleW 46448->46449 46450 306dc87 46449->46450 46450->46446 46199 73c7068 46200 73c706e 46199->46200 46201 73c705f 46199->46201 46204 73c8ca0 46200->46204 46220 73c8c90 46200->46220 46205 73c8cba 46204->46205 46206 73c8cde 46205->46206 46236 73c931e 46205->46236 46245 73c95dc 46205->46245 46249 73c92a3 46205->46249 46254 73c90e0 46205->46254 46259 73c9309 46205->46259 46264 73c99e8 46205->46264 46269 73c9392 46205->46269 46274 73c9616 46205->46274 46279 73c91d6 46205->46279 46283 73c9435 46205->46283 46287 73c98bb 46205->46287 46292 73c957a 46205->46292 46297 73c9adf 46205->46297 46206->46201 46221 73c8cba 46220->46221 46222 73c8cde 46221->46222 46223 73c95dc 2 API calls 46221->46223 46224 73c931e 4 API calls 46221->46224 46225 73c9adf 2 API calls 46221->46225 46226 73c957a 2 API calls 46221->46226 46227 73c98bb 2 API calls 46221->46227 46228 73c9435 2 API calls 46221->46228 46229 73c91d6 2 API calls 46221->46229 46230 73c9616 2 API calls 46221->46230 46231 73c9392 2 API calls 46221->46231 46232 73c99e8 2 API calls 46221->46232 46233 73c9309 2 API calls 46221->46233 46234 73c90e0 2 API calls 46221->46234 46235 73c92a3 2 API calls 46221->46235 46222->46201 46223->46222 46224->46222 46225->46222 46226->46222 46227->46222 46228->46222 46229->46222 46230->46222 46231->46222 46232->46222 46233->46222 46234->46222 46235->46222 46237 73c92cb 46236->46237 46238 73c932b 46236->46238 46237->46206 46302 73c6828 46238->46302 46306 73c6830 46238->46306 46239 73c9872 46239->46206 46240 73c9346 46240->46239 46310 73c68e8 46240->46310 46314 73c68f0 46240->46314 46318 73c6758 46245->46318 46322 73c6750 46245->46322 46246 73c9571 46250 73c92bd 46249->46250 46326 73c6268 46250->46326 46330 73c6270 46250->46330 46251 73c92ea 46251->46206 46255 73c90eb 46254->46255 46256 73c920c 46255->46256 46334 73c6b78 46255->46334 46338 73c6b71 46255->46338 46256->46206 46260 73c92be 46259->46260 46262 73c6268 ResumeThread 46260->46262 46263 73c6270 ResumeThread 46260->46263 46261 73c92ea 46261->46206 46262->46261 46263->46261 46265 73c99f2 46264->46265 46267 73c68e8 WriteProcessMemory 46265->46267 46268 73c68f0 WriteProcessMemory 46265->46268 46266 73c9a16 46267->46266 46268->46266 46270 73c93b5 46269->46270 46272 73c68e8 WriteProcessMemory 46270->46272 46273 73c68f0 WriteProcessMemory 46270->46273 46271 73c9234 46271->46206 46272->46271 46273->46271 46275 73c95db 46274->46275 46277 73c6758 Wow64SetThreadContext 46275->46277 46278 73c6750 Wow64SetThreadContext 46275->46278 46276 73c9571 46277->46276 46278->46276 46281 73c6b78 CreateProcessA 46279->46281 46282 73c6b71 CreateProcessA 46279->46282 46280 73c920c 46280->46206 46281->46280 46282->46280 46285 73c6758 Wow64SetThreadContext 46283->46285 46286 73c6750 Wow64SetThreadContext 46283->46286 46284 73c9454 46285->46284 46286->46284 46288 73c98c4 46287->46288 46290 73c68e8 WriteProcessMemory 46288->46290 46291 73c68f0 WriteProcessMemory 46288->46291 46289 73c9a16 46290->46289 46291->46289 46293 73c959b 46292->46293 46294 73c9872 46293->46294 46295 73c68e8 WriteProcessMemory 46293->46295 46296 73c68f0 WriteProcessMemory 46293->46296 46294->46206 46295->46293 46296->46293 46342 73c69d8 46297->46342 46346 73c69e0 46297->46346 46298 73c997e 46298->46297 46299 73c9b72 46298->46299 46303 73c6870 VirtualAllocEx 46302->46303 46305 73c68ad 46303->46305 46305->46240 46307 73c6870 VirtualAllocEx 46306->46307 46309 73c68ad 46307->46309 46309->46240 46311 73c6938 WriteProcessMemory 46310->46311 46313 73c698f 46311->46313 46313->46240 46315 73c6938 WriteProcessMemory 46314->46315 46317 73c698f 46315->46317 46317->46240 46319 73c679d Wow64SetThreadContext 46318->46319 46321 73c67e5 46319->46321 46321->46246 46323 73c679d Wow64SetThreadContext 46322->46323 46325 73c67e5 46323->46325 46325->46246 46327 73c62b0 ResumeThread 46326->46327 46329 73c62e1 46327->46329 46329->46251 46331 73c62b0 ResumeThread 46330->46331 46333 73c62e1 46331->46333 46333->46251 46335 73c6c01 CreateProcessA 46334->46335 46337 73c6dc3 46335->46337 46339 73c6c01 CreateProcessA 46338->46339 46341 73c6dc3 46339->46341 46343 73c6a2b ReadProcessMemory 46342->46343 46345 73c6a6f 46343->46345 46345->46298 46347 73c6a2b ReadProcessMemory 46346->46347 46349 73c6a6f 46347->46349 46349->46298 46506 73c9e48 46507 73c9fd3 46506->46507 46509 73c9e6e 46506->46509 46509->46507 46510 73c5024 46509->46510 46511 73ca0c8 PostMessageW 46510->46511 46512 73ca134 46511->46512 46512->46509 46451 306d6e1 46452 306d6a4 DuplicateHandle 46451->46452 46454 306d6ea 46451->46454 46453 306d6b6 46452->46453 46455 5699340 46458 5698b48 46455->46458 46457 569935f 46459 5698b53 46458->46459 46461 3065cec GetModuleHandleW 46459->46461 46462 30682aa GetModuleHandleW 46459->46462 46460 56993e4 46460->46457 46461->46460 46462->46460 46463 5699cc0 46465 3065cec GetModuleHandleW 46463->46465 46466 30682aa GetModuleHandleW 46463->46466 46464 5699cd3 46465->46464 46466->46464 46350 306d3d8 46351 306d41e GetCurrentProcess 46350->46351 46353 306d470 GetCurrentThread 46351->46353 46354 306d469 46351->46354 46355 306d4a6 46353->46355 46356 306d4ad GetCurrentProcess 46353->46356 46354->46353 46355->46356 46357 306d4e3 46356->46357 46358 306d50b GetCurrentThreadId 46357->46358 46359 306d53c 46358->46359 46467 3064668 46468 306467a 46467->46468 46469 3064686 46468->46469 46473 3064778 46468->46473 46478 3064204 46469->46478 46471 30646a5 46474 306479d 46473->46474 46482 3064878 46474->46482 46486 3064888 46474->46486 46479 306420f 46478->46479 46494 3065c6c 46479->46494 46481 3066ff0 46481->46471 46484 30648af 46482->46484 46483 306498c 46483->46483 46484->46483 46490 30644e4 46484->46490 46487 30648af 46486->46487 46488 306498c 46487->46488 46489 30644e4 CreateActCtxA 46487->46489 46489->46488 46491 3065918 CreateActCtxA 46490->46491 46493 30659db 46491->46493 46495 3065c77 46494->46495 46498 3065c8c 46495->46498 46497 3067095 46497->46481 46499 3065c97 46498->46499 46502 3065cbc 46499->46502 46501 306717a 46501->46497 46503 3065cc7 46502->46503 46504 3065cec GetModuleHandleW 46503->46504 46505 306726d 46504->46505 46505->46501
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29bd00222b8636f9194e02e87bd49b40c925bf05694f853b782bfa10bbadc3c7
                                            • Instruction ID: a6920ef408c7b0c3d4c46d0092c7bcbdb7ebd620bc14c6c69957ce28af6936f1
                                            • Opcode Fuzzy Hash: 29bd00222b8636f9194e02e87bd49b40c925bf05694f853b782bfa10bbadc3c7
                                            • Instruction Fuzzy Hash: BD626172A0410ADFCB15CF68C584AAEBFF2FF48314F198969E4069B265D770ED81CB61

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 0306D456
                                            • GetCurrentThread.KERNEL32 ref: 0306D493
                                            • GetCurrentProcess.KERNEL32 ref: 0306D4D0
                                            • GetCurrentThreadId.KERNEL32 ref: 0306D529
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 95e3d817e6e526f8fe7f538d70d5c6c643e8e1080eec255ccd81252075ce4c86
                                            • Instruction ID: ab73ee0d1f311da2de17efa20f7b1e3b3df75f306b4f04afd26be168b204abe2
                                            • Opcode Fuzzy Hash: 95e3d817e6e526f8fe7f538d70d5c6c643e8e1080eec255ccd81252075ce4c86
                                            • Instruction Fuzzy Hash: B15157B0A023098FDB14DFAAD548BDEBBF1EF48304F248459D409A77A0D779A944CF65

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 0306D456
                                            • GetCurrentThread.KERNEL32 ref: 0306D493
                                            • GetCurrentProcess.KERNEL32 ref: 0306D4D0
                                            • GetCurrentThreadId.KERNEL32 ref: 0306D529
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 3a1538ddcefcde16069a17e733d185076bbf5717383bea0ec4c345e673964679
                                            • Instruction ID: 8bcee8426426a4f7561a58e076a72af0e06249967b8d8ca219fe2331bb62002d
                                            • Opcode Fuzzy Hash: 3a1538ddcefcde16069a17e733d185076bbf5717383bea0ec4c345e673964679
                                            • Instruction Fuzzy Hash: B85164B09013098FDB14DFAAD548BDEBBF1EF88304F248059E409A77A0D779A944CF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 44 73c6b71-73c6c0d 46 73c6c0f-73c6c19 44->46 47 73c6c46-73c6c66 44->47 46->47 48 73c6c1b-73c6c1d 46->48 54 73c6c9f-73c6cce 47->54 55 73c6c68-73c6c72 47->55 49 73c6c1f-73c6c29 48->49 50 73c6c40-73c6c43 48->50 52 73c6c2d-73c6c3c 49->52 53 73c6c2b 49->53 50->47 52->52 56 73c6c3e 52->56 53->52 63 73c6d07-73c6dc1 CreateProcessA 54->63 64 73c6cd0-73c6cda 54->64 55->54 57 73c6c74-73c6c76 55->57 56->50 58 73c6c78-73c6c82 57->58 59 73c6c99-73c6c9c 57->59 61 73c6c84 58->61 62 73c6c86-73c6c95 58->62 59->54 61->62 62->62 65 73c6c97 62->65 75 73c6dca-73c6e50 63->75 76 73c6dc3-73c6dc9 63->76 64->63 66 73c6cdc-73c6cde 64->66 65->59 68 73c6ce0-73c6cea 66->68 69 73c6d01-73c6d04 66->69 70 73c6cec 68->70 71 73c6cee-73c6cfd 68->71 69->63 70->71 71->71 73 73c6cff 71->73 73->69 86 73c6e60-73c6e64 75->86 87 73c6e52-73c6e56 75->87 76->75 89 73c6e74-73c6e78 86->89 90 73c6e66-73c6e6a 86->90 87->86 88 73c6e58 87->88 88->86 92 73c6e88-73c6e8c 89->92 93 73c6e7a-73c6e7e 89->93 90->89 91 73c6e6c 90->91 91->89 94 73c6e9e-73c6ea5 92->94 95 73c6e8e-73c6e94 92->95 93->92 96 73c6e80 93->96 97 73c6ebc 94->97 98 73c6ea7-73c6eb6 94->98 95->94 96->92 100 73c6ebd 97->100 98->97 100->100
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073C6DAE
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 7f051617f1f4ce50b153345001fcb1a22a19de27998f5935874a6dc88afa5d9f
                                            • Instruction ID: 3c7f139135cdbe8430aba7cf557e207adeaa8d7ef05bfc90fbf5decad963170a
                                            • Opcode Fuzzy Hash: 7f051617f1f4ce50b153345001fcb1a22a19de27998f5935874a6dc88afa5d9f
                                            • Instruction Fuzzy Hash: 6E9159B1D00219CFEB24CF69C941BEDBBB2EF48310F1481AEE849A7240DB759985CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 101 73c6b78-73c6c0d 103 73c6c0f-73c6c19 101->103 104 73c6c46-73c6c66 101->104 103->104 105 73c6c1b-73c6c1d 103->105 111 73c6c9f-73c6cce 104->111 112 73c6c68-73c6c72 104->112 106 73c6c1f-73c6c29 105->106 107 73c6c40-73c6c43 105->107 109 73c6c2d-73c6c3c 106->109 110 73c6c2b 106->110 107->104 109->109 113 73c6c3e 109->113 110->109 120 73c6d07-73c6dc1 CreateProcessA 111->120 121 73c6cd0-73c6cda 111->121 112->111 114 73c6c74-73c6c76 112->114 113->107 115 73c6c78-73c6c82 114->115 116 73c6c99-73c6c9c 114->116 118 73c6c84 115->118 119 73c6c86-73c6c95 115->119 116->111 118->119 119->119 122 73c6c97 119->122 132 73c6dca-73c6e50 120->132 133 73c6dc3-73c6dc9 120->133 121->120 123 73c6cdc-73c6cde 121->123 122->116 125 73c6ce0-73c6cea 123->125 126 73c6d01-73c6d04 123->126 127 73c6cec 125->127 128 73c6cee-73c6cfd 125->128 126->120 127->128 128->128 130 73c6cff 128->130 130->126 143 73c6e60-73c6e64 132->143 144 73c6e52-73c6e56 132->144 133->132 146 73c6e74-73c6e78 143->146 147 73c6e66-73c6e6a 143->147 144->143 145 73c6e58 144->145 145->143 149 73c6e88-73c6e8c 146->149 150 73c6e7a-73c6e7e 146->150 147->146 148 73c6e6c 147->148 148->146 151 73c6e9e-73c6ea5 149->151 152 73c6e8e-73c6e94 149->152 150->149 153 73c6e80 150->153 154 73c6ebc 151->154 155 73c6ea7-73c6eb6 151->155 152->151 153->149 157 73c6ebd 154->157 155->154 157->157
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073C6DAE
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: d3205c9e7a22c50f8e3ae6a391ed6b4635b20680530593418981a2389c32e763
                                            • Instruction ID: 90b134649b5ebea935ace3300aa972004def0ca82e0f8c6c0e547c97ef0cc2ac
                                            • Opcode Fuzzy Hash: d3205c9e7a22c50f8e3ae6a391ed6b4635b20680530593418981a2389c32e763
                                            • Instruction Fuzzy Hash: 18914AB1D00219CFEB24CF69C941BEDBBB2FF48310F0481AAE849A7240DB759985CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 158 306ad48-306ad57 159 306ad83-306ad87 158->159 160 306ad59-306ad66 call 306a0a0 158->160 162 306ad9b-306addc 159->162 163 306ad89-306ad93 159->163 167 306ad7c 160->167 168 306ad68 160->168 169 306adde-306ade6 162->169 170 306ade9-306adf7 162->170 163->162 167->159 213 306ad6e call 306afd0 168->213 214 306ad6e call 306afe0 168->214 169->170 171 306ae1b-306ae1d 170->171 172 306adf9-306adfe 170->172 177 306ae20-306ae27 171->177 174 306ae00-306ae07 call 306a0ac 172->174 175 306ae09 172->175 173 306ad74-306ad76 173->167 176 306aeb8-306af78 173->176 181 306ae0b-306ae19 174->181 175->181 208 306af80-306afab GetModuleHandleW 176->208 209 306af7a-306af7d 176->209 178 306ae34-306ae3b 177->178 179 306ae29-306ae31 177->179 182 306ae3d-306ae45 178->182 183 306ae48-306ae4a call 306a0bc 178->183 179->178 181->177 182->183 187 306ae4f-306ae51 183->187 189 306ae53-306ae5b 187->189 190 306ae5e-306ae63 187->190 189->190 191 306ae65-306ae6c 190->191 192 306ae81-306ae8e 190->192 191->192 194 306ae6e-306ae7e call 306a0cc call 306a0dc 191->194 198 306ae90-306aeae 192->198 199 306aeb1-306aeb7 192->199 194->192 198->199 210 306afb4-306afc8 208->210 211 306afad-306afb3 208->211 209->208 211->210 213->173 214->173
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0306AF9E
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: c5c038ada357af2870b0d26548581a229ca6f9ffbe11cb3959f2d31db643877a
                                            • Instruction ID: 1669ec8ef95272d5fcbc037591954ee80f8733180f273a4fb478953f7d8ebd6a
                                            • Opcode Fuzzy Hash: c5c038ada357af2870b0d26548581a229ca6f9ffbe11cb3959f2d31db643877a
                                            • Instruction Fuzzy Hash: 717143B0A01B058FD764EF6AD44079AB7F5FF88304F048A2AD44AEBB44D779E845CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 215 306590d-30659d9 CreateActCtxA 217 30659e2-3065a3c 215->217 218 30659db-30659e1 215->218 225 3065a3e-3065a41 217->225 226 3065a4b-3065a4f 217->226 218->217 225->226 227 3065a60 226->227 228 3065a51-3065a5d 226->228 230 3065a61 227->230 228->227 230->230
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 030659C9
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 9fb71a53da1cfccad90485d4e48a1f855ca61cb641b8489cd45ef9b94c1c1e9e
                                            • Instruction ID: ab00a92e13981613b26c38744356804c04f667eb1b54b99e37b4de95fe01ebd7
                                            • Opcode Fuzzy Hash: 9fb71a53da1cfccad90485d4e48a1f855ca61cb641b8489cd45ef9b94c1c1e9e
                                            • Instruction Fuzzy Hash: 6141DD70C0161DCFDB24DFA9C884B9DBBB2BF49304F24815AD408AB255DB75594ACF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 231 30644e4-30659d9 CreateActCtxA 234 30659e2-3065a3c 231->234 235 30659db-30659e1 231->235 242 3065a3e-3065a41 234->242 243 3065a4b-3065a4f 234->243 235->234 242->243 244 3065a60 243->244 245 3065a51-3065a5d 243->245 247 3065a61 244->247 245->244 247->247
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 030659C9
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: b7159c97ea26e16b0dfa5525dbbb81541378c0850ff8ff2fa3af9a2bcd75e461
                                            • Instruction ID: 1d6e1ea369f398349604704031f904c8b918191a2b311489a456f39b3ae497aa
                                            • Opcode Fuzzy Hash: b7159c97ea26e16b0dfa5525dbbb81541378c0850ff8ff2fa3af9a2bcd75e461
                                            • Instruction Fuzzy Hash: 2341BC70C0171DCFDB24CFA9C884B9EBBF5AF49304F24806AD418AB255DB75694ACF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 248 306d6e1-306d6e8 249 306d6a4-306d6b4 DuplicateHandle 248->249 250 306d6ea-306d80e 248->250 251 306d6b6-306d6bc 249->251 252 306d6bd-306d6da 249->252 251->252
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0306D6A7
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 4f5cb5433efa50038e25d0feb6abb2050283dcd86c704d7921abe2acc4a72629
                                            • Instruction ID: 46d4d790c38a1e5df8645399d01ac6fcfe5d415425d9c9ab2c56d3b2f2c16584
                                            • Opcode Fuzzy Hash: 4f5cb5433efa50038e25d0feb6abb2050283dcd86c704d7921abe2acc4a72629
                                            • Instruction Fuzzy Hash: 9031C2346613C4CFE704EFA5E5857A93BA2F788310F24806AE9019B7E4CAB94899CF11

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 266 73c68e8-73c693e 268 73c694e-73c698d WriteProcessMemory 266->268 269 73c6940-73c694c 266->269 271 73c698f-73c6995 268->271 272 73c6996-73c69c6 268->272 269->268 271->272
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073C6980
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 68205f1ea4756f9a0b6dfaa14a442c7661fb3299284a86cffc3955ca4e171a4a
                                            • Instruction ID: 3b80d9ddcd3f2675dfe87e7a5ac9a5ca85813397c4ac1beeec624f5f28d660e9
                                            • Opcode Fuzzy Hash: 68205f1ea4756f9a0b6dfaa14a442c7661fb3299284a86cffc3955ca4e171a4a
                                            • Instruction Fuzzy Hash: 522125B59003499FDF14CFAAC881BEEBBF1BF48310F14846EE959A7240C7789945CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 276 5697024-5698804 278 569880f-569881e 276->278 279 5698806-569880c 276->279 280 5698820 278->280 281 5698823-569885c DrawTextExW 278->281 279->278 280->281 282 569885e-5698864 281->282 283 5698865-5698882 281->283 282->283
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0569879D,?,?), ref: 0569884F
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1542534939.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5690000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: e0cdd59942035e31353b60e6a088edcc0ed8df3316e7f2fe458dd2dad201bbfd
                                            • Instruction ID: 81c7c0309a42229e8cee96153c51ea34137addc1dd76680f6ab3733d5f201349
                                            • Opcode Fuzzy Hash: e0cdd59942035e31353b60e6a088edcc0ed8df3316e7f2fe458dd2dad201bbfd
                                            • Instruction Fuzzy Hash: D031D1B5D003099FDF14CF9AD984ADEBBF9FB48210F14842AE919A7710D774A944CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 286 56987b0-5698804 288 569880f-569881e 286->288 289 5698806-569880c 286->289 290 5698820 288->290 291 5698823-569885c DrawTextExW 288->291 289->288 290->291 292 569885e-5698864 291->292 293 5698865-5698882 291->293 292->293
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0569879D,?,?), ref: 0569884F
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1542534939.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5690000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: 436983f6850273d79f80f794d88a822820d8bf63c7f24e8cccfd08a683bbe76a
                                            • Instruction ID: b49080a515610ac96f7e7c78c8040ab475e6cf48809303c87f79a815a68af9bd
                                            • Opcode Fuzzy Hash: 436983f6850273d79f80f794d88a822820d8bf63c7f24e8cccfd08a683bbe76a
                                            • Instruction Fuzzy Hash: 0A31DFB5D003099FDB14CF9AD984ADEBBF9BB48220F14842AE819A7710D775A940CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 296 73c68f0-73c693e 298 73c694e-73c698d WriteProcessMemory 296->298 299 73c6940-73c694c 296->299 301 73c698f-73c6995 298->301 302 73c6996-73c69c6 298->302 299->298 301->302
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073C6980
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 96e2a7fcd16a1137c6c985f6180bbc7186bee0bf91829e00e1e3589625260ef4
                                            • Instruction ID: 0eb5c6332dc9c1dc71cee12ddfbdb023b96937c9316d9f25ae3acc129271921c
                                            • Opcode Fuzzy Hash: 96e2a7fcd16a1137c6c985f6180bbc7186bee0bf91829e00e1e3589625260ef4
                                            • Instruction Fuzzy Hash: 152124B59003499FDB14CFAAC881BEEBBF5FF48310F10842AE958A7240C7799940CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 306 73c6750-73c67a3 308 73c67a5-73c67b1 306->308 309 73c67b3-73c67e3 Wow64SetThreadContext 306->309 308->309 311 73c67ec-73c681c 309->311 312 73c67e5-73c67eb 309->312 312->311
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073C67D6
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: ff497cfa791800c294acb95e350f79de03aa26991ed6a2b42130e16b014dff8b
                                            • Instruction ID: c86dbd75fae89258a7e4bf550a10404b1f4e421bdf942fd5ae109173d398fe39
                                            • Opcode Fuzzy Hash: ff497cfa791800c294acb95e350f79de03aa26991ed6a2b42130e16b014dff8b
                                            • Instruction Fuzzy Hash: 352145B5D003498FDB14CFAAC485BEEBBF4AF88210F14882ED459A7641CB789944CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 316 73c69d8-73c6a6d ReadProcessMemory 319 73c6a6f-73c6a75 316->319 320 73c6a76-73c6aa6 316->320 319->320
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073C6A60
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 3809a38f5ee554d801bd60450c2b26d13204f8668c601700490eb7dad6be220c
                                            • Instruction ID: d1f3383e4b919408650dd216614b936d5f3d4ec350698522218fdd26e7f72217
                                            • Opcode Fuzzy Hash: 3809a38f5ee554d801bd60450c2b26d13204f8668c601700490eb7dad6be220c
                                            • Instruction Fuzzy Hash: 192124B5C003499FDB14CFAAC881AEEBBF1FF48310F14842EE959A7250C7799940CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 324 73c6758-73c67a3 326 73c67a5-73c67b1 324->326 327 73c67b3-73c67e3 Wow64SetThreadContext 324->327 326->327 329 73c67ec-73c681c 327->329 330 73c67e5-73c67eb 327->330 330->329
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073C67D6
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: ec17f5874371a25438a9e2654f84b3dbcb297e5651b48848d9ab7530e0b043b4
                                            • Instruction ID: fd357ac73e4eecfdfb9b75f6f4f9e2d0b5a493db39fc7d4ceea189344c64d2e4
                                            • Opcode Fuzzy Hash: ec17f5874371a25438a9e2654f84b3dbcb297e5651b48848d9ab7530e0b043b4
                                            • Instruction Fuzzy Hash: EB2134B5D003098FDB14DFAAC485BEEBBF4EF48220F14882ED559A7240CB789944CFA4
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073C6A60
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 5e5f27c7987f8f4fcd072c9bc01a757da280bf80c994a6c3043ea42a1a7832b6
                                            • Instruction ID: 64492c8cb771f2e82320bb7ce6f648b3ff71276d33074234e770c9cc0f7886d0
                                            • Opcode Fuzzy Hash: 5e5f27c7987f8f4fcd072c9bc01a757da280bf80c994a6c3043ea42a1a7832b6
                                            • Instruction Fuzzy Hash: 952105B5C003499FDB14CFAAC881BEEBBF5FF48310F14842AE958A7250C7799940CBA4
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 073CA125
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 055b5de040c27604208e1723061c2088de3ea65b2e62f1143534c5d3bed3bee9
                                            • Instruction ID: f4b0d921d646bfa4e18437a0b16b7da0148ea0acee89acef0d148d0227139060
                                            • Opcode Fuzzy Hash: 055b5de040c27604208e1723061c2088de3ea65b2e62f1143534c5d3bed3bee9
                                            • Instruction Fuzzy Hash: 622127B68003499FEB20CF99D444BDEFBF4EB48324F20855ED559A7610C379A944CFA5
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0306D6A7
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 3b7691a8a3c98e93e76a9bc254d181cae1ca4e489d16021dec0c1be3fee60058
                                            • Instruction ID: c192ef617cdda4ed44ddc737508741108700355c6788300841bf64575b3a39ad
                                            • Opcode Fuzzy Hash: 3b7691a8a3c98e93e76a9bc254d181cae1ca4e489d16021dec0c1be3fee60058
                                            • Instruction Fuzzy Hash: 5621E2B5D012089FDB10CFAAD984AEEBBF5EF48314F14841AE958B7350D378A940CF64
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0306D6A7
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 71b405661adb1e36d161e7433794d814c884aba077e9aeb8a89c20f3cbf4f9fd
                                            • Instruction ID: 8556dfce807277c62745e7102cb2a57ded29e1bd07bba11bbd9558d24ccf0b9e
                                            • Opcode Fuzzy Hash: 71b405661adb1e36d161e7433794d814c884aba077e9aeb8a89c20f3cbf4f9fd
                                            • Instruction Fuzzy Hash: 6521E2B5D003489FDB10CFAAD984ADEFBF8EB48310F14801AE958A7350C379A940CFA4
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073C689E
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: e398aadb73722ac8850d8da4a09ea2a5584c7222c70662ce9c7ed1868065ff0b
                                            • Instruction ID: 6ce310240129fd51c2f684511137be47aa081e0cd09f99443453e409270af50f
                                            • Opcode Fuzzy Hash: e398aadb73722ac8850d8da4a09ea2a5584c7222c70662ce9c7ed1868065ff0b
                                            • Instruction Fuzzy Hash: 5E1136758003489FDF24CFAAC845BDEBBF1AF88314F14881DD959A7650CA799940CFA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 25ac71ee390010e4edbee517d55fff2ad21a35a5029b4a991d79c72cb0d8fe81
                                            • Instruction ID: 321e20a481829c1cef5bb18cedf13fd14f384f7f04c7bb84b22a2934652d5a60
                                            • Opcode Fuzzy Hash: 25ac71ee390010e4edbee517d55fff2ad21a35a5029b4a991d79c72cb0d8fe81
                                            • Instruction Fuzzy Hash: 301137B5D003488FDB24DFAAC445BEEBBF5EF88214F24881EC459A7640CB799941CF95
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073C689E
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 6cb480ff1163a94cefb13065061d017a563b3eb7199eb8f93234ccef4bc28138
                                            • Instruction ID: cd6a08771bcec0fa8f9d6374fc62ab0603ae28837246b7f9db1d9dac9dd99aa9
                                            • Opcode Fuzzy Hash: 6cb480ff1163a94cefb13065061d017a563b3eb7199eb8f93234ccef4bc28138
                                            • Instruction Fuzzy Hash: 4E1114758003499FDB24DFAAC845BDEBBF5EF88314F14881AE919A7250CB799940CBA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 0c9b3aaa1b211aa230bf0b55dd3ca67859bdda237d281458351bfc409f78e21e
                                            • Instruction ID: 3aed1da97e42815872f34779e4b4c85fbfc18906497a285d7d0f0eb9cdb490f7
                                            • Opcode Fuzzy Hash: 0c9b3aaa1b211aa230bf0b55dd3ca67859bdda237d281458351bfc409f78e21e
                                            • Instruction Fuzzy Hash: 821128B5D003488FDB24DFAAC445BDEFBF5EF48214F14841ED559A7240CA79A940CBA5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 073CA125
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543884159.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_73c0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 7ce9386e36a0593323e585b81f89c030620a2add40f32dfa236a4650cadfddbf
                                            • Instruction ID: 42eace635dfc6a651e0ca251ce6562c9940593f6467b9735ef5d1a0564606836
                                            • Opcode Fuzzy Hash: 7ce9386e36a0593323e585b81f89c030620a2add40f32dfa236a4650cadfddbf
                                            • Instruction Fuzzy Hash: 831103B580034D9FDB20CF9AD884BDEFBF8EB48314F10845AE558A7600C379A944CFA5
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0306AF9E
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1532452954.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_3060000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: c5a56a6c8605f0596af1daf21a8b5a235d38899d9189479337d416ee1b627298
                                            • Instruction ID: f00601847bd2c3ca675f6db1233fa1bb8f40aa016ff4838c1c1f5e5195448854
                                            • Opcode Fuzzy Hash: c5a56a6c8605f0596af1daf21a8b5a235d38899d9189479337d416ee1b627298
                                            • Instruction Fuzzy Hash: C8110FB6D013498FCB20DF9AD444ADEFBF8EF88214F14841AD818B7610C3B9A545CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0,Wq
                                            • API String ID: 0-851448320
                                            • Opcode ID: fb954ed55ac23cec7d302c6401eaccd836a9be314a89660a13a8738582f592c5
                                            • Instruction ID: fb026e59fa468e8bd845496a928244d33c32d604d8b66d6ad663638ccbf00938
                                            • Opcode Fuzzy Hash: fb954ed55ac23cec7d302c6401eaccd836a9be314a89660a13a8738582f592c5
                                            • Instruction Fuzzy Hash: 10517135F106049BD704AF68D845AADBBB3FF89300F1588A9E8916B395CF31AD4A87D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0,Wq
                                            • API String ID: 0-851448320
                                            • Opcode ID: fd663f8cb43774f6dc98623f59ddf6bb0709ac0abc041c23a49d78580d31b494
                                            • Instruction ID: 5852aa8873b34bb0d6fe863c09b23bb0fcf056241a0b3222532eaefe7e2fb296
                                            • Opcode Fuzzy Hash: fd663f8cb43774f6dc98623f59ddf6bb0709ac0abc041c23a49d78580d31b494
                                            • Instruction Fuzzy Hash: 54516235F106149BD704AFA8D845AADBFB3FB89300F1584A9E8916B395CF31AD4A87C1
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a3793dfff380fee8cbd8eb48a8fc246c582dcab229dabde270b8fed07014f26
                                            • Instruction ID: 87995f612b634a98a1e880c84a4c4ff178baac0cc605a81d182eb23fcf4c600b
                                            • Opcode Fuzzy Hash: 0a3793dfff380fee8cbd8eb48a8fc246c582dcab229dabde270b8fed07014f26
                                            • Instruction Fuzzy Hash: 92F11076A00119DFCB04CF68C984EADBBF6FF88315B1584A9E405AB362DB34ED41CB50
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72a585532168a388dca23781ab5c5cb082bc62bfd2ffd87c9fae1082f43c1a22
                                            • Instruction ID: b354467c4e45b6f587f90542cf985546384888587b1db634e6bb94a3aea4b00e
                                            • Opcode Fuzzy Hash: 72a585532168a388dca23781ab5c5cb082bc62bfd2ffd87c9fae1082f43c1a22
                                            • Instruction Fuzzy Hash: E651E275F0460ADFEB04DBAAC4407BEBFB2BB84215F108926F556E7380CB349D428B91
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dfa091b120ed361b654143f348d7f884dd3284690267d733d8f5f5a26fc682c8
                                            • Instruction ID: 9462a711e26c9b736084eb6d37001a5d64f8da01e0c0f72b060276009a0d4b1f
                                            • Opcode Fuzzy Hash: dfa091b120ed361b654143f348d7f884dd3284690267d733d8f5f5a26fc682c8
                                            • Instruction Fuzzy Hash: CA617D71E0074ACFDB15CFA9C540AADBFF2FF89304F259A19E855AB241D770AA41CB50
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ba4315261e01bc06729fd076a1f74476f425ddee97c54beb3b298aa8e24006b
                                            • Instruction ID: 53a214c5074d96b1c67c2f39d47eefac0e09f63afb19815c2169f6c301eb0f4e
                                            • Opcode Fuzzy Hash: 0ba4315261e01bc06729fd076a1f74476f425ddee97c54beb3b298aa8e24006b
                                            • Instruction Fuzzy Hash: DC518035B006068FDB14DBB99848A7EBBF7EFC5224B14892AE415D7391EB30DD058BA1
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f7d85b1aa83dc4e4b8ffaa6354469c43057a127f4c48ef30758a63146544fc2
                                            • Instruction ID: e353ba16d690b184bcea2cb0778e066a87057e75f470d9d9f47e24cb91ed57b6
                                            • Opcode Fuzzy Hash: 1f7d85b1aa83dc4e4b8ffaa6354469c43057a127f4c48ef30758a63146544fc2
                                            • Instruction Fuzzy Hash: F2516C71E0574ADFCB15CFA5C140AADBFF2FF89304F259A19E845AB241E370AA81CB50
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9266d441d4056b4fed84e955e5a20ba95b8209c9ed3870315b8b131ca1a1d18
                                            • Instruction ID: c4c4abd60050ee5eaf0b746d21462ebf652f9e7c22a7285f0fc41aa46669be5f
                                            • Opcode Fuzzy Hash: d9266d441d4056b4fed84e955e5a20ba95b8209c9ed3870315b8b131ca1a1d18
                                            • Instruction Fuzzy Hash: 1E419132E0424ADFCF11CFA4C845AADBFB2FF45314F088865E906AB291D731E995DB90
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 675e63cd422d5e41bbdbeb0f9d77860a93ebf53b79e701f54f06262db392d635
                                            • Instruction ID: 7208de477c1fddfd298c9baff0cd4273159151e86630fd892ab06acbcffce3ae
                                            • Opcode Fuzzy Hash: 675e63cd422d5e41bbdbeb0f9d77860a93ebf53b79e701f54f06262db392d635
                                            • Instruction Fuzzy Hash: 6841C236B002049FDB14AB69D859A6E7FF7FBC8220F14446AE506D7390CE35AD02CBA4
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0173c29a85c431e40dfe98af41019aa9ba4cd9d73a8e068bb191bcc6f425c4d5
                                            • Instruction ID: c5573dcc2c6fd25d6d6518712b827e77c977f1ce478447ed6118c550884d11a2
                                            • Opcode Fuzzy Hash: 0173c29a85c431e40dfe98af41019aa9ba4cd9d73a8e068bb191bcc6f425c4d5
                                            • Instruction Fuzzy Hash: DB31F6327083804FD701977598193697FF2EB86215F0988ABE586CB3D2CD388C06C762
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af0170d346bde534ec4c8e6a1b6866c5bff662212c54442bee8f14779dd613e7
                                            • Instruction ID: cac3d8cd103791068836b7b327a2a3a61e5072060b88fffbbc8b9ebb6ada84fe
                                            • Opcode Fuzzy Hash: af0170d346bde534ec4c8e6a1b6866c5bff662212c54442bee8f14779dd613e7
                                            • Instruction Fuzzy Hash: 493159769002099FCB14CFAAD845A9EBFF9EB48314F14842AE809E7310D779A944CFA0
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cdf6c6a4232b630b992c3a25ccf674a9c6b0a67367bffd14c9e545f0023ab3bd
                                            • Instruction ID: 96443ac2e1c8bca62728d88ad517d28aab8c968606c1b5af93638247741c558f
                                            • Opcode Fuzzy Hash: cdf6c6a4232b630b992c3a25ccf674a9c6b0a67367bffd14c9e545f0023ab3bd
                                            • Instruction Fuzzy Hash: BF31D07590565A8FC714CF6AC4446BEBFF2BB81209F14896BD0EB97A41C734D941CB22
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24695159d57b9f26249aa186d8e0ff1efdaef318ac2181711362979afa8572e7
                                            • Instruction ID: 3f9c15bd45b2f67be46082fa9e514b1028690d459251d7c9c5713242685dd755
                                            • Opcode Fuzzy Hash: 24695159d57b9f26249aa186d8e0ff1efdaef318ac2181711362979afa8572e7
                                            • Instruction Fuzzy Hash: D221781680F7C68FD317976848A86C07F72AD1325871A09EBC1D98F963D11C884AC3A3
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7f29169701d892da701cd4ea3edd1af8e648092eba7a6e645c924da07ec1bc4
                                            • Instruction ID: 76524cd3198a749618ce65262c4281e0b8f5079c5c361638bd8bc495af223d8d
                                            • Opcode Fuzzy Hash: d7f29169701d892da701cd4ea3edd1af8e648092eba7a6e645c924da07ec1bc4
                                            • Instruction Fuzzy Hash: 4721F132B143018FD7149BB9981972E3EE6EB89219F14897AF907C7781DE35CC02C792
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 517388e10596b0248ac33bef1674c50088c5dab12da278fac976c611b4171f72
                                            • Instruction ID: c1fbc9bfb920fd93e0a47d35ae32c2023014c329f12b69d30e3036c375858f13
                                            • Opcode Fuzzy Hash: 517388e10596b0248ac33bef1674c50088c5dab12da278fac976c611b4171f72
                                            • Instruction Fuzzy Hash: 1D317571A006168FDB04DF68C8889AEBBF6FF84318B258559E416973A5CB34ED42CB94
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531542965.0000000002DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ded000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d24d3ce6282b1d37ad52e01e6e22d7ff3f1ec9d9793221b031397b70845b166
                                            • Instruction ID: dfd8dfb1a33e21de3ed5ffaf1bde5ce886a51c6f713b0220ff7f282f47ca742b
                                            • Opcode Fuzzy Hash: 7d24d3ce6282b1d37ad52e01e6e22d7ff3f1ec9d9793221b031397b70845b166
                                            • Instruction Fuzzy Hash: 5021D071604304DFDF24EF14D980B16BB6AEB84314F38C569E84A4B396CB3AD847CA62
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531542965.0000000002DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ded000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9dedd55e35734570a8257e3d5efb5e6d6f780221008775ae615f1606ed7775cc
                                            • Instruction ID: 72a2cbc258f34e570d4f0116a9a1e6508d84370a50613ae4ff5b31d658e8ae47
                                            • Opcode Fuzzy Hash: 9dedd55e35734570a8257e3d5efb5e6d6f780221008775ae615f1606ed7775cc
                                            • Instruction Fuzzy Hash: 2021F575504304EFDF15EF50D5C0B15BB6AFB84314F20C56DD84A4B392C736D846CA61
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4a6ca4ca6dc1e8ff2c7fcf2d033687cbb97032af97c8310ba27e4d2808d33f48
                                            • Instruction ID: 1c4c13be5a45a36c585001d167f44e4613390a91c75d6ca46e0b56f76917e185
                                            • Opcode Fuzzy Hash: 4a6ca4ca6dc1e8ff2c7fcf2d033687cbb97032af97c8310ba27e4d2808d33f48
                                            • Instruction Fuzzy Hash: 9121D531B04205DFD714DA7A9859B2A7EB7EBC8215F50486ED60BD7385DE30CD054792
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29b24be7ec3533c1917d5ea70acae8607f21131dac2b8fe50a1eb2324f68e06a
                                            • Instruction ID: e3b028f2024b2b3092aab6c7a168b5f940baf0e938e12b8fed5848ef06bfa04c
                                            • Opcode Fuzzy Hash: 29b24be7ec3533c1917d5ea70acae8607f21131dac2b8fe50a1eb2324f68e06a
                                            • Instruction Fuzzy Hash: 68112432B04301EFD714CA7A984AB2A7EB7EBC8205F50486EE60AD7285DE30CD058792
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a15af99027f5c4eb1834ece2fb195f15107738f260ee670bec1f19a09bbfbb2e
                                            • Instruction ID: 1606079bb7245b879f8a23f43897875d5fdff58eb75c641cea3791675bea13f8
                                            • Opcode Fuzzy Hash: a15af99027f5c4eb1834ece2fb195f15107738f260ee670bec1f19a09bbfbb2e
                                            • Instruction Fuzzy Hash: 6631DFB1C01258DFDB20CFAAC988B9EBFF5AB48314F24885AE405BB250C7B99945CF55
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f8a832561e4e329a5e942c19f16300d624ccfe9f5c087ff357d5b551fc15947
                                            • Instruction ID: 90ef5a5abfd7798b22421ca574a4cd1cc387cd1d194c395292d10b8bb6902b0d
                                            • Opcode Fuzzy Hash: 1f8a832561e4e329a5e942c19f16300d624ccfe9f5c087ff357d5b551fc15947
                                            • Instruction Fuzzy Hash: 2121A0B1D01219DFDB20CF9AC988B8EBFB5AB48314F24845AE404BB250C7B99945CBA5
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531542965.0000000002DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ded000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 631bdf5d6d931a1e2fee671264b5781f3fa264e00dcc0ef25b567c2fe9713e88
                                            • Instruction ID: f18704a4d3e5d144b8f01e00b0f9ed2bee9214e1e36c83a0e2ca9d5c5fe987fa
                                            • Opcode Fuzzy Hash: 631bdf5d6d931a1e2fee671264b5781f3fa264e00dcc0ef25b567c2fe9713e88
                                            • Instruction Fuzzy Hash: 022184755093C08FCB12DF24D594715BF72EF46214F28C5EAD8498F6A7C33A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60f28c009c290d1aadc584dd2d6fc5d3790c2c517e4f2c7935fc04e53c529b3d
                                            • Instruction ID: 1e9d40ab322c1fe5a4775f57f81a380e4c37faa5ebe68828a02937cc20de8c81
                                            • Opcode Fuzzy Hash: 60f28c009c290d1aadc584dd2d6fc5d3790c2c517e4f2c7935fc04e53c529b3d
                                            • Instruction Fuzzy Hash: 6111BB72A06117CBC7148FAED8812BABAF1FF44209F40093AA617EAA80D634A950C795
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 853c8a8b16bdf60465ad447080eb21139157caf42a3abf12c36aed038b810c03
                                            • Instruction ID: 6cc37a43d9fd2323a08fb21bf45d9d3bb16c513cf3bca8fd1b09d50b84fc822d
                                            • Opcode Fuzzy Hash: 853c8a8b16bdf60465ad447080eb21139157caf42a3abf12c36aed038b810c03
                                            • Instruction Fuzzy Hash: C111C276A006164BCB10DABA8C44ABFBBFBFBC4264B18892DE415D7340EF30DD058B60
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b150670a65add73a483f6d698c9344a7a60b4f8d3ac0fef9618d5226a4d9a940
                                            • Instruction ID: 18e301e31c6cee89783cfca559582d77abd54c2c901ecebba945e93716328c61
                                            • Opcode Fuzzy Hash: b150670a65add73a483f6d698c9344a7a60b4f8d3ac0fef9618d5226a4d9a940
                                            • Instruction Fuzzy Hash: 25114F36B112059FCB14DF64D846B9DBFF6FB8C215F14446AE916A7350CA31AD11CBA0
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1eff3e632270f3ddb0051330eeee769a4abeaa27ec7fc66d579c6fddf0ae815d
                                            • Instruction ID: 683ae52c4b59c78dc5cd747a9fa88c2842b255afdf6c6a391670c4c75fd24e0f
                                            • Opcode Fuzzy Hash: 1eff3e632270f3ddb0051330eeee769a4abeaa27ec7fc66d579c6fddf0ae815d
                                            • Instruction Fuzzy Hash: 05111F32F0021A8BCB54EBA9D8105FEBBF6BB88314B504579C515E7244EB368E52CB91
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c172cbaca75f726c7363bd96da4d41ec590d7579bc9bb2e9052d0e9f48ecb450
                                            • Instruction ID: a433b02f5f9605f69173f231ec32b9b6954f35ac07ca94b440faa7502067295e
                                            • Opcode Fuzzy Hash: c172cbaca75f726c7363bd96da4d41ec590d7579bc9bb2e9052d0e9f48ecb450
                                            • Instruction Fuzzy Hash: 0D2100B6C003499FCB20CF9AD884ADEBFF4FB48314F10841AE919A7210C779A944CFA5
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 568f739f5798c2da35488a07e06676d6d4ac5dc49602e3ba6ae324e0cbb1a528
                                            • Instruction ID: de1dfb4906278d3d1cb063ac3e6a286707b00fb0876466b436ceedf6d0362f21
                                            • Opcode Fuzzy Hash: 568f739f5798c2da35488a07e06676d6d4ac5dc49602e3ba6ae324e0cbb1a528
                                            • Instruction Fuzzy Hash: 70014532B40201DFE7248A2ACC05F6ABBA3FBC5708F118839F1078FA95CEB1D8418791
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531542965.0000000002DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ded000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction ID: fbff3b8d09f47929a22220a4b84dcac2b5cf847f876bbb792749f4e462710587
                                            • Opcode Fuzzy Hash: 6f5963e13be94118601ce8c0c816b14e795ac28cdb338ecf6f134e886058e23b
                                            • Instruction Fuzzy Hash: 9C118B75504280DFCF15DF50D6C4B15BBA2FB84318F24C6AAD84A4B796C33AD84ACB61
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ea90f293afb165def3444c54859b113105810b655867fd5d9a4e4d68ae62048
                                            • Instruction ID: a73f46b075926127e9d67b253eb17616e7e17ed5ad1a63e346fb4a897c66730c
                                            • Opcode Fuzzy Hash: 7ea90f293afb165def3444c54859b113105810b655867fd5d9a4e4d68ae62048
                                            • Instruction Fuzzy Hash: 2601CC76A06417CBC7148FAED4803BDFAB2FF44309F004922E617EAAC1DB30AA51C795
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f65f6f08c916767fca11a0ce474f9d495bea26ad5d812221a0de4d13349eea4f
                                            • Instruction ID: 9425c2222d43fd7fd7d62e2d86dafa5c0afede7937abab259fbc4cd3cb6ca500
                                            • Opcode Fuzzy Hash: f65f6f08c916767fca11a0ce474f9d495bea26ad5d812221a0de4d13349eea4f
                                            • Instruction Fuzzy Hash: 03111B70D0060CDFEB44EFA4C94279EBBF2EB48200F5085A9C115E7350EB359E469F81
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d71a88ec1c9a6dc922288d6ae09dfe3bebcb3c5ae6d06d8d7617a741762f23b0
                                            • Instruction ID: d7e9bb3114942ce79578a0fdb7e556d11c8626cf68fbf461a1221b904d4c4fef
                                            • Opcode Fuzzy Hash: d71a88ec1c9a6dc922288d6ae09dfe3bebcb3c5ae6d06d8d7617a741762f23b0
                                            • Instruction Fuzzy Hash: 85011772A001199BCF09DF99D8458DDBBF9FF88310B04852AE90AEB254D731A919CB90
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531418289.0000000002DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ddd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4ed1fd6a7f937dd9c39c802b31c87bd838de5103e63d7faadff6b1b7e0973e06
                                            • Instruction ID: 5c25c7f8200548307c0feb79c609851be303565b34abf8870712941d7a5f8a1a
                                            • Opcode Fuzzy Hash: 4ed1fd6a7f937dd9c39c802b31c87bd838de5103e63d7faadff6b1b7e0973e06
                                            • Instruction Fuzzy Hash: 7D01A732504744BEEB204A55CD84B66BBA9DF41224F18859AED4A4A786C7799C40CA72
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91a13c58886497dc49c928e43efcd13ed05fade87e79b8c0d1b09c548a23da14
                                            • Instruction ID: 56a079b56436efe5c95b80097014a29d0324d3b0d6debbca99abfe0ddf898ba1
                                            • Opcode Fuzzy Hash: 91a13c58886497dc49c928e43efcd13ed05fade87e79b8c0d1b09c548a23da14
                                            • Instruction Fuzzy Hash: B101E570D0020DEFEB44EFA4C551A9EBBB6FB48200F5085AAC515EB350EB355E469F81
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5c648dd131bce353739a3a11c065d067d76ee04694f9ca9acd35f821319d2e9
                                            • Instruction ID: a6b6399d67dcf2e215a6f308081b0ee146945984bc2bfda1bf0509ea136278e7
                                            • Opcode Fuzzy Hash: f5c648dd131bce353739a3a11c065d067d76ee04694f9ca9acd35f821319d2e9
                                            • Instruction Fuzzy Hash: 58F0B47BF042165FCB28CE6DC844BBE3BAAEB88364F198876E026C7350D935DD808751
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 474864727a33e23236c9725b9da59d47ba9eb8cedce1f2fb462332f74c98dcb8
                                            • Instruction ID: 3efaae8edfe4b3e207dfb59a9dcef86b67f47e10ab706417fea64ea5e9f5bd2c
                                            • Opcode Fuzzy Hash: 474864727a33e23236c9725b9da59d47ba9eb8cedce1f2fb462332f74c98dcb8
                                            • Instruction Fuzzy Hash: E3012171C0421ADFDB14CF69C8443ED7FF1BF48314F148A29D425AA2A0D3744A85CF90
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1531418289.0000000002DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DDD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_2ddd000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f490688ecf6ee3be418646e7ecd36f574b42ead543914e92bae906fd23b093f7
                                            • Instruction ID: 1564c846216442dca92e470b9526e0262686d2f9589f262d4424316e67145675
                                            • Opcode Fuzzy Hash: f490688ecf6ee3be418646e7ecd36f574b42ead543914e92bae906fd23b093f7
                                            • Instruction Fuzzy Hash: A0F0CD32404344AEEB208A06CC84B62FFA8EF41634F18C49AED090B386C379AC40CAB1
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b17489b4d7870b2e1e25f89e11b7dd34ad108eca4213017ee33820b527a4fabf
                                            • Instruction ID: 36204b74337a08732adc3956d65ac5999a946f7a2023426188254e6c7fa8f26d
                                            • Opcode Fuzzy Hash: b17489b4d7870b2e1e25f89e11b7dd34ad108eca4213017ee33820b527a4fabf
                                            • Instruction Fuzzy Hash: C2F0B437F0068A87DB25E7ACC8101FE7BB7ABC82547208525C406A7344FE26CD62CB91
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b76db64179589ad77bfe5b7c6bfc578ac08c7803488c944a7208e5dae9876e0
                                            • Instruction ID: 9745732cf941d74b5e88075c364a94a3753299eb939987acd6dbe15dc48a4349
                                            • Opcode Fuzzy Hash: 1b76db64179589ad77bfe5b7c6bfc578ac08c7803488c944a7208e5dae9876e0
                                            • Instruction Fuzzy Hash: EBF030767042186F93049A6EDC84D6BBBEEEBCC671755817AF50DD7310D9319C0186B0
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9d2b72f6a30bf721a9435cea23da5c9b87d0255f563594ae58fab2b15245dd99
                                            • Instruction ID: fcc7e5dbdfe003a8367e7ead218231a6cac1c78c9b57f22e03d26f8ec6258301
                                            • Opcode Fuzzy Hash: 9d2b72f6a30bf721a9435cea23da5c9b87d0255f563594ae58fab2b15245dd99
                                            • Instruction Fuzzy Hash: 9A01FB71C0021ADFEB14CF6AC8083AEBEF1BF48354F10CA25E425AA290D7744A81CFD0
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c23fb4992a131bc43c5c704a03bcdd433120ee5299e4ffd5cb4b343d95c099aa
                                            • Instruction ID: 7df69051d32f20afce5e95eba2f8c2bcc43d2e0851b5ca3cee722de79577488b
                                            • Opcode Fuzzy Hash: c23fb4992a131bc43c5c704a03bcdd433120ee5299e4ffd5cb4b343d95c099aa
                                            • Instruction Fuzzy Hash: 7BF0EC73609209AFD701DA6CCD45E6A7FA5EF5560CB104C95E4098B101D9319D009656
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d952ba58157a132190f5c1343c9772dbad0486b34021c96537463f8d26786d2
                                            • Instruction ID: 4135aa39078fdd0f0d14d63318e5bbf60d35dfd7ea4693dc7ca8a150d9c1ac39
                                            • Opcode Fuzzy Hash: 5d952ba58157a132190f5c1343c9772dbad0486b34021c96537463f8d26786d2
                                            • Instruction Fuzzy Hash: 06F0A773A041496FDF05CFA8D94599E7FBAEF04218B0980ABE445E7371E6319E54C750
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 112f7aff6f99370a1b2871c7e2fbe7a7386049a9aea79362bbadf799aef22dbe
                                            • Instruction ID: 87b04119f7a19e3bd151eb1e18986c12dffdb30493b461ddb4910d6fd58ad9c2
                                            • Opcode Fuzzy Hash: 112f7aff6f99370a1b2871c7e2fbe7a7386049a9aea79362bbadf799aef22dbe
                                            • Instruction Fuzzy Hash: ABF02772B4A3849FDB05CBB48C198AE7FF59F8210871548EBE806D7242E9308D09D322
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 20ccd2aed0096100db788d9acffa3ef455991c8dc845d940833d6ce871109480
                                            • Instruction ID: 2d756e6954c441e36174bc64e57a71a4ece473ab925877348beb138a8de479d3
                                            • Opcode Fuzzy Hash: 20ccd2aed0096100db788d9acffa3ef455991c8dc845d940833d6ce871109480
                                            • Instruction Fuzzy Hash: 51E03972B042286FA3049A6AE884D6BBBEEEBCC670351807AF508C7310D931AC0086A0
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d3b9c7ca7b88ecf03051b6d812048f57d49a5613da1aadc26d79f65edef6ead
                                            • Instruction ID: 20eef307dcece8e81e7ba7d3caa50ec1256ac0299c6b8216caa3426965588088
                                            • Opcode Fuzzy Hash: 8d3b9c7ca7b88ecf03051b6d812048f57d49a5613da1aadc26d79f65edef6ead
                                            • Instruction Fuzzy Hash: 71D01291705A1EDFE7105A65841AB353CB7FB82654B9098B9D403EAB88CE7ACD028A12
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c81e8c18fbed0db158e39c9570233fed98ad29bbe398c62097b085a5f3fd9aa9
                                            • Instruction ID: 70f7178ae4d44bece684b0ef393013552142357def2d0996cbd86e3f0873df26
                                            • Opcode Fuzzy Hash: c81e8c18fbed0db158e39c9570233fed98ad29bbe398c62097b085a5f3fd9aa9
                                            • Instruction Fuzzy Hash: C3C04C7605674D8BD228AFA5A61CB247AB9E70121AF44141CD54E52463CBF1D850CA65
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e336042d199c2c3996cfad34ef551ea3cc2684fd619d3c9705a0611b56c7b428
                                            • Instruction ID: 01a171ca852922b1378569e44fa44b156d07569b1e59be5d8cc0a87a149fe3d9
                                            • Opcode Fuzzy Hash: e336042d199c2c3996cfad34ef551ea3cc2684fd619d3c9705a0611b56c7b428
                                            • Instruction Fuzzy Hash: 2CC0027BA5A6C15EE7466F609829D82BF72BA6220C34990E2D0905B173D515882CE725
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 83ee5d744cb3e991202416803482875f0e5c2709e7cc8c98786a271cb4cda3f6
                                            • Instruction ID: 39297574e5660ed3e46c0b08ea977b8f912166a5dd61139f4089b2860073fdd5
                                            • Opcode Fuzzy Hash: 83ee5d744cb3e991202416803482875f0e5c2709e7cc8c98786a271cb4cda3f6
                                            • Instruction Fuzzy Hash: 64B01237265646B2E10462A849C5E1F5C21EFB2B0DBC08C05B389584008930DC2DE52F
                                            Memory Dump Source
                                            • Source File: 00000016.00000002.1543487138.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_22_2_5ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e578579684357e8d3bd0724d182e4fda7278625cf498e068f7792d194105cfb
                                            • Instruction ID: 1960ad32f2fe329ef3bc902e67d477b489a0c234dd3468aa7b7abde275cae50f
                                            • Opcode Fuzzy Hash: 1e578579684357e8d3bd0724d182e4fda7278625cf498e068f7792d194105cfb
                                            • Instruction Fuzzy Hash: 75C08C121AB3C10EE302433408288862F30197320D3082083C28262063C004005CD23A

                                            Execution Graph

                                            Execution Coverage:7.5%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:42
                                            Total number of Limit Nodes:6
                                            execution_graph 38597 6cadfb8 38598 6cadfbd 38597->38598 38600 6cadfe9 38598->38600 38601 6cad444 38598->38601 38602 6cad44f 38601->38602 38603 6cae303 38602->38603 38605 6cad460 38602->38605 38603->38600 38606 6cae338 OleInitialize 38605->38606 38607 6cae39c 38606->38607 38607->38603 38574 16d0848 38576 16d0849 38574->38576 38575 16d091b 38576->38575 38578 16d1380 38576->38578 38579 16d1383 38578->38579 38580 16d14ba 38579->38580 38582 16d84f0 38579->38582 38580->38576 38583 16d84fa 38582->38583 38584 16d8514 38583->38584 38587 6bbb2f8 38583->38587 38592 6bbb308 38583->38592 38584->38579 38588 6bbb308 38587->38588 38589 6bbb532 38588->38589 38590 6bbb960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38588->38590 38591 6bbb950 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38588->38591 38589->38584 38590->38588 38591->38588 38594 6bbb31d 38592->38594 38593 6bbb532 38593->38584 38594->38593 38595 6bbb960 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38594->38595 38596 6bbb950 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 38594->38596 38595->38594 38596->38594 38608 16deef8 DuplicateHandle 38609 16def8e 38608->38609 38610 16d70b8 38611 16d70fc CheckRemoteDebuggerPresent 38610->38611 38612 16d713e 38611->38612 38613 16decb0 38614 16decf6 GetCurrentProcess 38613->38614 38616 16ded48 GetCurrentThread 38614->38616 38617 16ded41 38614->38617 38618 16ded7e 38616->38618 38619 16ded85 GetCurrentProcess 38616->38619 38617->38616 38618->38619 38622 16dedbb 38619->38622 38620 16dede3 GetCurrentThreadId 38621 16dee14 38620->38621 38622->38620

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 016DED2E
                                            • GetCurrentThread.KERNEL32 ref: 016DED6B
                                            • GetCurrentProcess.KERNEL32 ref: 016DEDA8
                                            • GetCurrentThreadId.KERNEL32 ref: 016DEE01
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: aa605b22406cb77da711ec5c620a7055fc5a17e0d97e0df759207c0414b99f33
                                            • Instruction ID: 0dad45fe0a226c83ecf29128d2773b19e6d2cdba0585be646cbc9aac11f75988
                                            • Opcode Fuzzy Hash: aa605b22406cb77da711ec5c620a7055fc5a17e0d97e0df759207c0414b99f33
                                            • Instruction Fuzzy Hash: 365159B2D01749CFDB18CFAAC948B9EBBF1EF48304F248459D409AB350D7795944CB65

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 016DED2E
                                            • GetCurrentThread.KERNEL32 ref: 016DED6B
                                            • GetCurrentProcess.KERNEL32 ref: 016DEDA8
                                            • GetCurrentThreadId.KERNEL32 ref: 016DEE01
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 2df4585ef3707ef4e7c70b7fd6d08678e3761aad241a673fe97279843f7d95b2
                                            • Instruction ID: 16794121a13de0d00e0ed132ed5e4fa62837e105e34041a5c369166004f99acc
                                            • Opcode Fuzzy Hash: 2df4585ef3707ef4e7c70b7fd6d08678e3761aad241a673fe97279843f7d95b2
                                            • Instruction Fuzzy Hash: 2C5146B1D01749CFDB28CFAAD948B9EBBF1EF48304F208459D409AB360DB799944CB65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 810 6bbc120-6bbc12b 811 6bbc12d-6bbc154 call 6bbb8e8 810->811 812 6bbc155-6bbc174 call 6bbb8f4 810->812 818 6bbc17a-6bbc1d9 812->818 819 6bbc176-6bbc179 812->819 826 6bbc1db-6bbc1de 818->826 827 6bbc1df-6bbc26c GlobalMemoryStatusEx 818->827 831 6bbc26e-6bbc274 827->831 832 6bbc275-6bbc29d 827->832 831->832
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2580966227.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_6bb0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f1310da53810b603f1956c13d6dbe59a8bdfff6a834b0b5be0a673f5cc88e8e2
                                            • Instruction ID: 400df8e09d51b5ae57be7f1e906cd5942b09242378ca247c91982d20e6b740cc
                                            • Opcode Fuzzy Hash: f1310da53810b603f1956c13d6dbe59a8bdfff6a834b0b5be0a673f5cc88e8e2
                                            • Instruction Fuzzy Hash: 83412271D043598FDB14CFAAD8046EEBBF5EF89210F1585ABD444A7250DBB89841CBE0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 835 16d70b0-16d713c CheckRemoteDebuggerPresent 838 16d713e-16d7144 835->838 839 16d7145-16d7180 835->839 838->839
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 016D712F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: ddfad60e7dfbf86342a24160b214fa23db780b13840b09841020a1300238971c
                                            • Instruction ID: 2bdb1e7e92330eb4a5d8f6a499af4fc285238c80f63045c5753012ccf2febccf
                                            • Opcode Fuzzy Hash: ddfad60e7dfbf86342a24160b214fa23db780b13840b09841020a1300238971c
                                            • Instruction Fuzzy Hash: 95216672C002598FCB14CFAAD884BEEFBF4EF49214F14842AE848A7250D778A944CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 842 16d70b8-16d713c CheckRemoteDebuggerPresent 844 16d713e-16d7144 842->844 845 16d7145-16d7180 842->845 844->845
                                            APIs
                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 016D712F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: CheckDebuggerPresentRemote
                                            • String ID:
                                            • API String ID: 3662101638-0
                                            • Opcode ID: aafa393495ad22f08054a7feaa8ce8f57b7db3563ac7577b54223091dd04b5cc
                                            • Instruction ID: a196449750565c9df70c098a6f50803ef695aff0a8c0b61a442cd293dea3aa52
                                            • Opcode Fuzzy Hash: aafa393495ad22f08054a7feaa8ce8f57b7db3563ac7577b54223091dd04b5cc
                                            • Instruction Fuzzy Hash: 2B214871C002598FDB14CFAAD844BEEFBF5EF49214F14841AE858A3350D778A944CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 853 6bbc1f0-6bbc1f5 854 6bbc1e2-6bbc1ef 853->854 855 6bbc1f7-6bbc236 853->855 854->853 857 6bbc23e-6bbc26c GlobalMemoryStatusEx 855->857 858 6bbc26e-6bbc274 857->858 859 6bbc275-6bbc29d 857->859 858->859
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BBC172), ref: 06BBC25F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2580966227.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_6bb0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 07fb8dee2680fdda15791b4a5e96ef56b39183006f8d949bf139d0be930528ac
                                            • Instruction ID: 8b444f67469bde88b976ba38743c041d57edd1dbdf64e51061b7b598756e1c09
                                            • Opcode Fuzzy Hash: 07fb8dee2680fdda15791b4a5e96ef56b39183006f8d949bf139d0be930528ac
                                            • Instruction Fuzzy Hash: 422145B1C042999FDB11CFAAC844BDEFFB4AF09210F1581AAD458A7252D378A944CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 848 16deef0-16def8c DuplicateHandle 849 16def8e-16def94 848->849 850 16def95-16defb2 848->850 849->850
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016DEF7F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: dc5217dd94b405bfcd196af43bc9240cf3496d69dd6d5622d74d4fae2668923d
                                            • Instruction ID: 57f2d57b5148962b8e3a124c15327ac5475b5559410d8da1cb772192c22b3d25
                                            • Opcode Fuzzy Hash: dc5217dd94b405bfcd196af43bc9240cf3496d69dd6d5622d74d4fae2668923d
                                            • Instruction Fuzzy Hash: 3921E2B5D002489FDB10CFAAD984ADEFFF5EB48310F14841AE918A7750D379A954CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 862 16deef8-16def8c DuplicateHandle 863 16def8e-16def94 862->863 864 16def95-16defb2 862->864 863->864
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016DEF7F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2555776130.00000000016D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_16d0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 092e9ad92c60b5ba852f13aec0b0550c1444c64e52baed62fc98f86b231d2fc6
                                            • Instruction ID: c8a784532e332411c4bbeb3cfb472ef5a79f5055cbf29bb7124b97d0791c80f3
                                            • Opcode Fuzzy Hash: 092e9ad92c60b5ba852f13aec0b0550c1444c64e52baed62fc98f86b231d2fc6
                                            • Instruction Fuzzy Hash: 8621C4B5D002489FDB10CFAAD984ADEFFF5EB48310F14841AE958A7350D379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 867 6bbb8f4-6bbc26c GlobalMemoryStatusEx 870 6bbc26e-6bbc274 867->870 871 6bbc275-6bbc29d 867->871 870->871
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06BBC172), ref: 06BBC25F
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2580966227.0000000006BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_6bb0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 62758c92d3fb8d0cdd6793003a3c779db723a905fd40b57d2cf41798262fe08e
                                            • Instruction ID: 0ea06f62486e662e9c18bbdb2d90af811fda4171686ef4ca0c1fc26fea3fbcea
                                            • Opcode Fuzzy Hash: 62758c92d3fb8d0cdd6793003a3c779db723a905fd40b57d2cf41798262fe08e
                                            • Instruction Fuzzy Hash: C21103B1C006599FDB10CF9AC444BEEFBF4EB48710F14816AE818B7640D7B8A940CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 874 6cad460-6cae39a OleInitialize 876 6cae39c-6cae3a2 874->876 877 6cae3a3-6cae3c0 874->877 876->877
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 06CAE38D
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2581266139.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_6ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: c78b1529cbd03819ac38d289797ca7a48f822bf0d0b2249d26144b8ea36efa45
                                            • Instruction ID: ba63fe5d7f2d5db6ec3690851ed69af823c586ba44b21ce86b775e6ac67add5d
                                            • Opcode Fuzzy Hash: c78b1529cbd03819ac38d289797ca7a48f822bf0d0b2249d26144b8ea36efa45
                                            • Instruction Fuzzy Hash: 2F1100B58007498FDB20DF9AD448BDEFBF4EB48224F20845AD558A7650C379A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 880 6cae330-6cae336 882 6cae338-6cae39a OleInitialize 880->882 883 6cae39c-6cae3a2 882->883 884 6cae3a3-6cae3c0 882->884 883->884
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 06CAE38D
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2581266139.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_6ca0000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: d67152a80f453adc2ca43beb067dedf68c7a8100290990f96469bbd55a1d0c40
                                            • Instruction ID: 51350ca44d4709fbfc6f424419bfcebaa84bfdfc1bed6d78c6277c8dd1b40b5c
                                            • Opcode Fuzzy Hash: d67152a80f453adc2ca43beb067dedf68c7a8100290990f96469bbd55a1d0c40
                                            • Instruction Fuzzy Hash: 911100B58003499FDB20DFAAD444BDEFBF4EB48324F20841AD559A7610C379A944CFA5
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2552923631.000000000144D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0144D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_144d000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eeb298ac7de53c1b27baaad9db3888e1fda73456e4843f623a516cf3eb95711f
                                            • Instruction ID: 885e5b6c89964010a592b211a6be73abb70fe7e7c7703e4d2bdcfc50508768ee
                                            • Opcode Fuzzy Hash: eeb298ac7de53c1b27baaad9db3888e1fda73456e4843f623a516cf3eb95711f
                                            • Instruction Fuzzy Hash: E03159715093C49FDB13CF64D994711BF71AB46214F29C5DBD9898F2A3C23A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000019.00000002.2552923631.000000000144D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0144D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_25_2_144d000_ZUHFqcY.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aad7a9fbbb1a09437095574ef3bc157c0735b64722f8abd11b58701ad42c9f39
                                            • Instruction ID: 17b17f14473f1418efa5c53d46064d5dbe8d5cf77d84649c0a8b11841c773e35
                                            • Opcode Fuzzy Hash: aad7a9fbbb1a09437095574ef3bc157c0735b64722f8abd11b58701ad42c9f39
                                            • Instruction Fuzzy Hash: 5321F5B1904304DFEB15DF94D9C0B16BBA5EB94318F24C56ED90A4B362C33AD447CA62