Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Pedido09669281099195.com.exe

Overview

General Information

Sample name:Pedido09669281099195.com.exe
Analysis ID:1523648
MD5:d5d0ab15509bcf177cb90288d995c308
SHA1:a5403d62a5d76fdb50c4d9f76b9dccb97336c4c4
SHA256:5155ec55e5e3c3bba6ce9982f1dd8491a87ce819820b358d6f7388310116d84c
Tags:comDarkTortillaexe
Infos:

Detection

DarkTortilla, Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Pedido09669281099195.com.exe (PID: 5308 cmdline: "C:\Users\user\Desktop\Pedido09669281099195.com.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
    • Pedido09669281099195.com.exe (PID: 4044 cmdline: "C:\Users\user\Desktop\Pedido09669281099195.com.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
    • Pedido09669281099195.com.exe (PID: 3064 cmdline: "C:\Users\user\Desktop\Pedido09669281099195.com.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
      • schtasks.exe (PID: 4328 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 3640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • workbook.exe (PID: 6864 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
        • workbook.exe (PID: 1456 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
          • schtasks.exe (PID: 2644 cmdline: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 6600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • workbook.exe (PID: 5344 cmdline: C:\Users\user\AppData\Roaming\SubDir\workbook.exe MD5: D5D0AB15509BCF177CB90288D995C308)
    • workbook.exe (PID: 1916 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
    • workbook.exe (PID: 6968 cmdline: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" MD5: D5D0AB15509BCF177CB90288D995C308)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "02351e291-5d041-4fa37-932c7-869aeec514992", "StartupKey": "workbook", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQANqzkhOLx49IztAjuviKazANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDgyMDEyNDQxNVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgCzkFEuivKBaTsClmq/3wI2X1uYUZUxf0vEiobTv72lQBIu1jz/r6PADg+cpeGisY1MV3VsdWhecO8dT7LosHtl/FnpTjASkUp3LF0d6cPTgeLsKbK/xJ06uq5gaKvG8Q5zXq6Jbxv+STJdEgmxCf1SPAXViD1PIiGLt2B24qZyOtsSpTSnM5cQuLAvr/6xZG7GYkCU7PRADMGFUm3Xg6L3vRUU3h6vaddoMBAW9ENXVaym1eN5aax3x4tLNUp+kerM+kb/Ab/mi01+PfutPKTptP/dqEGZuKmVrGdX9A+s2Wo6sPtSl85NJT+HT+SSrROvGbx4GH3d6MSHx71JSzy+dph46LV3brBMzY/2xvLbIuPVHqniL/Y0bsUke6aD9cfXIa4UBi7TiKBuoKJYqoYa/VgdoqB4yDaczAnzzYXov7thvPL1Rwv5TueNsPSrQbXbvEJUDxRazlLIrGLuYzeGrnbFHOTM8KKpSVnE8uiXiSEW31DRNHXyLImklMHjwtGd4sjZD5EfkUcg1v9gVCu80ggT+/l7SflY07DOLFvS1ii2ZUPu3IjcbyPtlFj6pGUYjMbIZj8AdqIKyMh6IWtbsu6TMC2yEPSk5pwXrEf7M89nIfHtuhZio+mZ0MhGyHos3nv51/dDBKQnEtcJiODik24kI3JTMGnfQsp7IMjECAwEAAaMyMDAwHQYDVR0OBBYEFFUq5ihhM0we5AVYMhcmFpT6wUKMMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAFQvpu2xTTenJ6N6YiRWxJ1cwH673yEt60lfsF/xncTeD79qdjD371b1GzQtcYZtYuSdgajGG4YZ8gBrwthm2fOcfuWK2VRDOe7/++mJVEvvsUzzexNeB5nZCYuu1N4UA7z8RHJy6ycPTTcelqyMKUjAGTCZa2BQhkxoFq+wBrEZrY975RcEe7bNNWg0S8YpvdKXxwy/gDZUoWyWXvgmDFQ6VjzDk3jJb0fonxnP/9F7sjd1uU2t5d6aQdPXzbzgWC/IKRXpfdIIZe15uHs1o1O909ymViRRsyy36cjwZ1M2snHWsU7vO//CptldBoV6k6bKkvXA23Cg1vUT0mj0MW554Vb20afxPhyWqHQa4ffHspH2HxViicHx9YaD+WjNAER0Skdo7/sxVR9Ozms2kb8Tyd18mwtVvwmlBNdtwsw8MX9PeW0AXlJUXkHkj47TVP+yyv1dKdUaGZq+ErPjiGoQGBCeHrrtGh+WryK38T7huLnpt++Q4U+CJ6+u9Mvd+C7MCZmgsO9sn0fTL/z54j3zBaWZoRcUZg8IZ7U+C5eGCrg9VjubVdYSar5CrCQnw8x2Rl63qjLVOwpiRoNnEXxmE23yyx1hkP8r27EcTbH7PpJHI22khScfDhf0X/99HEaBqcs+GI+YnC5dpPHY9koTdT5JckCfPJ9sprOn9Ble"}
SourceRuleDescriptionAuthorStrings
0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000000.00000002.3175567821.0000000005E50000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
      0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Pedido09669281099195.com.exe.5e50000.2.raw.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
              0.2.Pedido09669281099195.com.exe.5e50000.2.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                7.2.Pedido09669281099195.com.exe.540000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  7.2.Pedido09669281099195.com.exe.540000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    7.2.Pedido09669281099195.com.exe.540000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28ef13:$x1: Quasar.Common.Messages
                    • 0x29f23c:$x1: Quasar.Common.Messages
                    • 0x2ab832:$x4: Uninstalling... good bye :-(
                    • 0x2ad027:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    Click to see the 11 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\SubDir\workbook.exe", ParentImage: C:\Users\user\AppData\Roaming\SubDir\workbook.exe, ParentProcessId: 1456, ParentProcessName: workbook.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 2644, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Pedido09669281099195.com.exe", ParentImage: C:\Users\user\Desktop\Pedido09669281099195.com.exe, ParentProcessId: 3064, ParentProcessName: Pedido09669281099195.com.exe, ProcessCommandLine: "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f, ProcessId: 4328, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-01T22:11:23.627127+020020355951Domain Observed Used for C2 Detected213.159.74.809792192.168.2.649728TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-01T22:11:23.627127+020020276191Domain Observed Used for C2 Detected213.159.74.809792192.168.2.649728TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Pedido09669281099195.com.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeAvira: detection malicious, Label: HEUR/AGEN.1307443
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "twart.myfirewall.org:9792;", "SubDirectory": "SubDir", "InstallName": "workbook.exe", "MutexName": "02351e291-5d041-4fa37-932c7-869aeec514992", "StartupKey": "workbook", "LogDirectoryName": "Logs", "ServerSignature": "XBBvS+rvDQy/NRA7cnb+1Bf2zFbsUHBtrkbS5j0N0VYcCxHngz7kKbyn5Jk5bqDEI6eX9AB+bIEClKSPSVh4o0tmRTlCyQR8n6K5WidNbCUdY2+XqfpKSeeSe+/39iGrb9ZLHaZnA9ciC9yC4PwnmFUO4AD6c2tNeWgm2PU1ohA9OikWzIuh/ks9RkLPCX2N5NbpAd+AvnufkOJwDLDXLT4MfcZlD2s7folRvVMxMcO7qQh4qI3ucP90WFCEokdbM4Rp3wOtslDricIMAIkAmogGRz4B5aLGHo+UKGsYDeV1bWBtzFi1XTWQ/6q4qfqiD4xLJpDFMICIRPNdK9raQkGcTP03+NhWNSswQU59I2Ar9A0CAUdysw34N2Kjm/UbGRrW3+j9kbJxMldClUDkeN0cGmVyyaiGpPUQBlBuqH620bBOymsxD3XZ6Ouxl9MgjTV6Il/iiq/NSebMLiET2K09Tvpmc/8DD8KLeu+5NrJnmChJat6LR2NCPqv1vp8xPgJNCm4DSv6HB78QRq0Ni/oqW7UBnQR4da5/ckoEk+1ZyMZ/TftczNdKaLoyii2gXx3EzDhVEQy9OH8iNQqevGPW/pTYqLGAkH4hRs0+kir9p7nSGZpHvgHSJL7DbCzKlTEYyAlb4VFoR4L+DhJ0+A8JWxhOkfSCX2jo3RVCcPs=", "ServerCertificate": "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"}
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeReversingLabs: Detection: 60%
                    Source: Pedido09669281099195.com.exeReversingLabs: Detection: 60%
                    Source: Yara matchFile source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.4162153464.0000000008B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4307722200.0000000008C2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 1456, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJoe Sandbox ML: detected
                    Source: Pedido09669281099195.com.exeJoe Sandbox ML: detected
                    Source: Pedido09669281099195.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49729 version: TLS 1.2
                    Source: Pedido09669281099195.com.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 213.159.74.80:9792 -> 192.168.2.6:49728
                    Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 213.159.74.80:9792 -> 192.168.2.6:49728
                    Source: Malware configuration extractorURLs: twart.myfirewall.org
                    Source: Yara matchFile source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.6:49728 -> 213.159.74.80:9792
                    Source: Joe Sandbox ViewIP Address: 213.159.74.80 213.159.74.80
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewIP Address: 195.201.57.90 195.201.57.90
                    Source: Joe Sandbox ViewASN Name: CTINET-ASCTINETAutonomousSystemRU CTINET-ASCTINETAutonomousSystemRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: ipwho.is
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: twart.myfirewall.org
                    Source: global trafficDNS traffic detected: DNS query: ipwho.is
                    Source: workbook.exe, 0000000E.00000002.4592996243.00000000014A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: workbook.exe, 0000000E.00000002.4592996243.00000000014A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/ent
                    Source: workbook.exe, 0000000E.00000002.4594281993.00000000032FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: workbook.exe, 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.00000000032FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/d
                    Source: Pedido09669281099195.com.exe, 00000009.00000002.3193753874.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.000000000308B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: workbook.exe, 0000000E.00000002.4594281993.000000000312D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.000000000312D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.0000000003092000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                    Source: unknownHTTPS traffic detected: 195.201.57.90:443 -> 192.168.2.6:49729 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to behavior

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.4162153464.0000000008B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4307722200.0000000008C2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 1456, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DC058 CreateProcessAsUserW,0_2_018DC058
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_012A00400_2_012A0040
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_012A32A00_2_012A32A0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0169CF3C0_2_0169CF3C
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D71800_2_018D7180
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DC8E00_2_018DC8E0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D18200_2_018D1820
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D4B500_2_018D4B50
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D65C00_2_018D65C0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DC5D80_2_018DC5D8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DAF580_2_018DAF58
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D11B90_2_018D11B9
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DA1B00_2_018DA1B0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D11C80_2_018D11C8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DA9180_2_018DA918
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D71700_2_018D7170
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D00060_2_018D0006
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D18100_2_018D1810
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D00400_2_018D0040
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D23D00_2_018D23D0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D13F00_2_018D13F0
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D0B100_2_018D0B10
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D23210_2_018D2321
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D0B200_2_018D0B20
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D4B420_2_018D4B42
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D5B580_2_018D5B58
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D5B680_2_018D5B68
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D65AF0_2_018D65AF
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D14000_2_018D1400
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D8FB80_2_018D8FB8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018DCF780_2_018DCF78
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D76960_2_018D7696
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D0E100_2_018D0E10
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D0E200_2_018D0E20
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D16680_2_018D1668
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D16780_2_018D1678
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537B9100_2_0537B910
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05377D580_2_05377D58
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537D5B80_2_0537D5B8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537C9A80_2_0537C9A8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_053735F80_2_053735F8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537E8080_2_0537E808
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537DE400_2_0537DE40
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537F6A80_2_0537F6A8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537B90F0_2_0537B90F
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537D57E0_2_0537D57E
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_053735960_2_05373596
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537C9980_2_0537C998
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537E7F80_2_0537E7F8
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537DE300_2_0537DE30
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537F66D0_2_0537F66D
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05371E430_2_05371E43
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05371E480_2_05371E48
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_059717920_2_05971792
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_059710900_2_05971090
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05971C000_2_05971C00
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_059700060_2_05970006
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_059700400_2_05970040
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05971BF20_2_05971BF2
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07C187800_2_07C18780
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07C187700_2_07C18770
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CB75380_2_07CB7538
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CB30080_2_07CB3008
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CB30180_2_07CB3018
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CB750D0_2_07CB750D
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 9_2_0343F03C9_2_0343F03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015029C012_2_015029C0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154C5E012_2_0154C5E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154182012_2_01541820
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154C8E812_2_0154C8E8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01544B5012_2_01544B50
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154AF6012_2_0154AF60
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154FA0012_2_0154FA00
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154662012_2_01546620
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015472D012_2_015472D0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154A92012_2_0154A920
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015411C812_2_015411C8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154A1B812_2_0154A1B8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015411B912_2_015411B9
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154004012_2_01540040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154181012_2_01541810
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154000612_2_01540006
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154140012_2_01541400
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01545B5812_2_01545B58
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01544B4212_2_01544B42
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01545B6812_2_01545B68
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01540B1012_2_01540B10
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01540B2012_2_01540B20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154232212_2_01542322
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015423D012_2_015423D0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01548FC012_2_01548FC0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015413F012_2_015413F0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015477E612_2_015477E6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154CF8012_2_0154CF80
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154167812_2_01541678
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154166812_2_01541668
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01540E1012_2_01540E10
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0154660F12_2_0154660F
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01540E2012_2_01540E20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_015472C012_2_015472C0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0170CF3C12_2_0170CF3C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FB91012_2_032FB910
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FC9A812_2_032FC9A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FE80812_2_032FE808
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FDE4012_2_032FDE40
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FF6A812_2_032FF6A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F7D5812_2_032F7D58
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FD5B812_2_032FD5B8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F35F812_2_032F35F8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FB90112_2_032FB901
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FC99812_2_032FC998
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FE7F812_2_032FE7F8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FF62E12_2_032FF62E
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FDE3012_2_032FDE30
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F1E4812_2_032F1E48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F1E4212_2_032F1E42
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FD57E12_2_032FD57E
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0340004012_2_03400040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_0340000612_2_03400006
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4753812_2_07A47538
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4300812_2_07A43008
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4301812_2_07A43018
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07FB878012_2_07FB8780
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07FB877012_2_07FB8770
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4750D12_2_07A4750D
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_016F004013_2_016F0040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_016F302013_2_016F3020
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176C5E013_2_0176C5E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176182013_2_01761820
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176C8E813_2_0176C8E8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176AF6013_2_0176AF60
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01764B5013_2_01764B50
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176662013_2_01766620
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017672D013_2_017672D0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176A92013_2_0176A920
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017611C013_2_017611C0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017611C813_2_017611C8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176A1B813_2_0176A1B8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176004013_2_01760040
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176001213_2_01760012
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176181013_2_01761810
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176140013_2_01761400
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01765B6813_2_01765B68
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01765B5813_2_01765B58
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01764B4813_2_01764B48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176232413_2_01762324
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01760B2013_2_01760B20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01760B1013_2_01760B10
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017613F013_2_017613F0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017677E613_2_017677E6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017623D013_2_017623D0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01768FC013_2_01768FC0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01768FBF13_2_01768FBF
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176CF8013_2_0176CF80
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176167813_2_01761678
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176166813_2_01761668
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01760E2013_2_01760E20
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01760E1013_2_01760E10
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0176660F13_2_0176660F
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_017672C013_2_017672C0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_0184CF3C13_2_0184CF3C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B7D5813_2_053B7D58
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BD5B813_2_053BD5B8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B35F813_2_053B35F8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BDE4013_2_053BDE40
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BF6A813_2_053BF6A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BB91013_2_053BB910
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BC9A813_2_053BC9A8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BE80813_2_053BE808
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BD57E13_2_053BD57E
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B359613_2_053B3596
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BE7F813_2_053BE7F8
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BDE3013_2_053BDE30
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BF66D13_2_053BF66D
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B1E4813_2_053B1E48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B1E4213_2_053B1E42
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BB90913_2_053BB909
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BC99813_2_053BC998
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EE753813_2_07EE7538
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EE300813_2_07EE3008
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EE301813_2_07EE3018
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EE750D13_2_07EE750D
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 14_2_02EEF03C14_2_02EEF03C
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 14_2_07FEB6E014_2_07FEB6E0
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 14_2_07FE7E4814_2_07FE7E48
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 16_2_016BF03C16_2_016BF03C
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3175567821.0000000005E50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000000.2122831930.0000000001228000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepppin.exeD vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3172206944.000000000176E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTokenTableApp.dll> vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3172569645.00000000018B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRP8SH.dll6 vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exeBinary or memory string: OriginalFilenamepppin.exeD vs Pedido09669281099195.com.exe
                    Source: Pedido09669281099195.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/3@2/2
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Pedido09669281099195.com.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6600:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3640:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMutant created: \Sessions\1\BaseNamedObjects\Local\02351e291-5d041-4fa37-932c7-869aeec514992
                    Source: Pedido09669281099195.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Pedido09669281099195.com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Pedido09669281099195.com.exe, 00000000.00000000.2118733877.0000000001219000.00000020.00000001.01000000.00000003.sdmp, workbook.exe.9.drBinary or memory string: SELECT * FROM Tasks WHERE DueDate = @Today OR RepeatedDays LIKE '%' + CAST(@TodayDay AS NVARCHAR) + '%' ORDER BY CASE WHEN ReminderDateTime IS NULL THEN 1 ELSE 0 END, ReminderDateTime, IsImportant DESC;
                    Source: Pedido09669281099195.com.exe, 00000000.00000000.2118733877.0000000001219000.00000020.00000001.01000000.00000003.sdmp, workbook.exe.9.drBinary or memory string: Select TaskID, Task FROM Tasks WHERE DueDate = @Today Or RepeatedDays Like '%' + CAST(@TodayDay AS NVARCHAR) + '%';
                    Source: Pedido09669281099195.com.exe, 00000000.00000000.2118733877.0000000001219000.00000020.00000001.01000000.00000003.sdmp, workbook.exe.9.drBinary or memory string: SELECT * FROM Tasks WHERE (DueDate = @Today OR RepeatedDays LIKE '%' + CAST(@TodayDay AS NVARCHAR) + '%') AND IsDone = 0 ORDER BY CASE WHEN ReminderDateTime IS NULL THEN 1 ELSE 0 END, ReminderDateTime, IsImportant DESC;
                    Source: Pedido09669281099195.com.exe, 00000000.00000000.2118733877.0000000001219000.00000020.00000001.01000000.00000003.sdmp, workbook.exe.9.drBinary or memory string: SELECT * FROM Tasks WHERE DueDate = @Today OR RepeatedDays LIKE '%' + CAST(@TodayDay AS NVARCHAR) + '%' ORDER BY IsDone ASC, CASE WHEN ReminderDateTime IS NULL THEN 1 ELSE 0 END, ReminderDateTime, IsImportant DESC;
                    Source: Pedido09669281099195.com.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile read: C:\Users\user\Desktop\Pedido09669281099195.com.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeSection loaded: msasn1.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Pedido09669281099195.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Pedido09669281099195.com.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: Pedido09669281099195.com.exeStatic file information: File size 5786112 > 1048576
                    Source: Pedido09669281099195.com.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x584200
                    Source: Pedido09669281099195.com.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.5e50000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.5e50000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3175567821.0000000005E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4299190110.000000000339C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3172809908.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.4156266240.0000000003451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D69C0 pushfd ; ret 0_2_018D69E9
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_018D694C pushfd ; ret 0_2_018D69E9
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537C865 pushad ; ret 0_2_0537C889
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05376CAB push edi; ret 0_2_05376EA6
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_0537938D push ds; retf 0040h0_2_053793DE
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_05376EB4 push eax; ret 0_2_05376EE5
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07C125C9 push esp; retf 0_2_07C125CA
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CB0DD7 push ecx; retf EFCDh0_2_07CB0F42
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CBD181 push ecx; retf 0046h0_2_07CBD1A2
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CBF334 pushad ; retf 0_2_07CBF38D
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeCode function: 0_2_07CBEA5B pushad ; ret 0_2_07CBEAB3
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_01546980 pushfd ; ret 12_2_015469A9
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F938D push ds; retf 0040h12_2_032F93DE
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F13D8 push eax; iretd 12_2_032F142E
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032FC874 pushad ; ret 12_2_032FC889
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F6EB4 push eax; ret 12_2_032F6EE5
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_032F6CAB push edi; ret 12_2_032F6EA6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4F334 pushad ; retf 12_2_07A4F38D
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A4D181 push ecx; retf 0046h12_2_07A4D1A2
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07A40DD7 push ecx; retf EFCDh12_2_07A40F42
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 12_2_07FB25C9 push esp; retf 12_2_07FB25CA
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_01766980 pushfd ; ret 13_2_017669A9
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B6CAB push edi; ret 13_2_053B6EA6
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B6EB4 push eax; ret 13_2_053B6EE5
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053BC865 pushad ; ret 13_2_053BC889
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_053B938D push ds; retf 0040h13_2_053B93DE
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EE0DD7 push ecx; retf EFCDh13_2_07EE0F42
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EED181 push ecx; retf 0046h13_2_07EED1A2
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EEEAA0 pushad ; ret 13_2_07EEEAB3
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 13_2_07EEEA5B pushad ; ret 13_2_07EEEAB3
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeCode function: 14_2_07FE8EA3 push eax; ret 14_2_07FE8EAD
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile created: C:\Users\user\AppData\Roaming\SubDir\workbook.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile opened: C:\Users\user\Desktop\Pedido09669281099195.com.exe\:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile opened: C:\Users\user\Desktop\Pedido09669281099195.com.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe\:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe\:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeFile opened: C:\Users\user\AppData\Roaming\SubDir\workbook.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 1660000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 3350000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 5350000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 8D00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 9D00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: AAE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: BAE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: C1A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: D1A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: C1A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: D1A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 1960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 34D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: 3370000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 16E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3450000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 32D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A630000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: B630000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: BC40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: CC40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: BC40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: CC40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 5390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 8840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 9840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: A610000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: B610000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: BCA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: CCA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: BCA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: CCA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 5060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 13D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 3110000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory allocated: 5110000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeWindow / User API: threadDelayed 8333Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeWindow / User API: threadDelayed 1521Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 5501Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 4351Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 3725Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 6126Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 2758Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWindow / User API: threadDelayed 7102Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exe TID: 3004Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exe TID: 3004Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exe TID: 2632Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 5796Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 5796Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6492Thread sleep count: 43 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6492Thread sleep time: -39660499758475511s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 6492Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 1352Thread sleep count: 3725 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 1352Thread sleep count: 6126 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 5880Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exe TID: 5500Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeThread delayed: delay time: 922337203685477
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3175567821.0000000005E50000.00000004.08000000.00040000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxTray
                    Source: workbook.exe, 0000000E.00000002.4613476200.0000000006211000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 2051979379GSOFTWARE\VMware, Inc.\VMware VGAuth
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory written: C:\Users\user\Desktop\Pedido09669281099195.com.exe base: 540000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory written: C:\Users\user\Desktop\Pedido09669281099195.com.exe base: 900000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeMemory written: C:\Users\user\Desktop\Pedido09669281099195.com.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 750000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeMemory written: C:\Users\user\AppData\Roaming\SubDir\workbook.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\Desktop\Pedido09669281099195.com.exe "C:\Users\user\Desktop\Pedido09669281099195.com.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Users\user\AppData\Roaming\SubDir\workbook.exe "C:\Users\user\AppData\Roaming\SubDir\workbook.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /fJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Users\user\Desktop\Pedido09669281099195.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Users\user\Desktop\Pedido09669281099195.com.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Users\user\AppData\Roaming\SubDir\workbook.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\SubDir\workbook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Pedido09669281099195.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.4162153464.0000000008B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4307722200.0000000008C2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 1456, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 7.2.Pedido09669281099195.com.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Pedido09669281099195.com.exe.b11b998.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.4162153464.0000000008B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.4307722200.0000000008C2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 5308, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Pedido09669281099195.com.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workbook.exe PID: 1456, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure1
                    Valid Accounts
                    21
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Masquerading
                    11
                    Input Capture
                    111
                    Security Software Discovery
                    Remote Services11
                    Input Capture
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    1
                    Valid Accounts
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    DLL Side-Loading
                    111
                    Process Injection
                    1
                    Access Token Manipulation
                    Security Account Manager41
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeylogging113
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
                    Process Injection
                    Cached Domain Credentials23
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Hidden Files and Directories
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Obfuscated Files or Information
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523648 Sample: Pedido09669281099195.com.exe Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 48 twart.myfirewall.org 2->48 50 ipwho.is 2->50 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 9 other signatures 2->64 11 Pedido09669281099195.com.exe 3 2->11         started        15 workbook.exe 2 2->15         started        signatures3 process4 file5 46 C:\Users\...\Pedido09669281099195.com.exe.log, ASCII 11->46 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 11->70 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->72 74 Injects a PE file into a foreign processes 11->74 17 Pedido09669281099195.com.exe 4 11->17         started        21 Pedido09669281099195.com.exe 11->21         started        23 Pedido09669281099195.com.exe 11->23         started        25 workbook.exe 15->25         started        27 workbook.exe 15->27         started        signatures6 process7 file8 44 C:\Users\user\AppData\...\workbook.exe, PE32 17->44 dropped 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->56 29 workbook.exe 3 17->29         started        32 schtasks.exe 1 17->32         started        signatures9 process10 signatures11 76 Antivirus detection for dropped file 29->76 78 Multi AV Scanner detection for dropped file 29->78 80 Machine Learning detection for dropped file 29->80 82 2 other signatures 29->82 34 workbook.exe 15 2 29->34         started        38 conhost.exe 32->38         started        process12 dnsIp13 52 twart.myfirewall.org 213.159.74.80, 49728, 9792 CTINET-ASCTINETAutonomousSystemRU Russian Federation 34->52 54 ipwho.is 195.201.57.90, 443, 49729 HETZNER-ASDE Germany 34->54 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 34->66 68 Installs a global keyboard hook 34->68 40 schtasks.exe 34->40         started        signatures14 process15 process16 42 conhost.exe 40->42         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Pedido09669281099195.com.exe61%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                    Pedido09669281099195.com.exe100%AviraHEUR/AGEN.1307443
                    Pedido09669281099195.com.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe100%AviraHEUR/AGEN.1307443
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\SubDir\workbook.exe61%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ipwho.is
                    195.201.57.90
                    truefalse
                      unknown
                      twart.myfirewall.org
                      213.159.74.80
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://ipwho.is/false
                          unknown
                          twart.myfirewall.orgtrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.datacontract.org/2004/07/dworkbook.exe, 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.00000000032FE000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://stackoverflow.com/q/14436606/23354Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.0000000003092000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://stackoverflow.com/q/2152978/23354sCannotPedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpfalse
                                unknown
                                http://schemas.datacontract.org/2004/07/workbook.exe, 0000000E.00000002.4594281993.00000000032FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePedido09669281099195.com.exe, 00000009.00000002.3193753874.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, workbook.exe, 0000000E.00000002.4594281993.000000000308B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://stackoverflow.com/q/11564914/23354;Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Pedido09669281099195.com.exe, 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ipwho.isworkbook.exe, 0000000E.00000002.4594281993.000000000312D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    213.159.74.80
                                    twart.myfirewall.orgRussian Federation
                                    13078CTINET-ASCTINETAutonomousSystemRUtrue
                                    195.201.57.90
                                    ipwho.isGermany
                                    24940HETZNER-ASDEfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1523648
                                    Start date and time:2024-10-01 22:07:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 33s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Pedido09669281099195.com.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@22/3@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 221
                                    • Number of non-executed functions: 30
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: Pedido09669281099195.com.exe
                                    TimeTypeDescription
                                    16:08:34API Interceptor235x Sleep call for process: Pedido09669281099195.com.exe modified
                                    16:10:17API Interceptor1947x Sleep call for process: workbook.exe modified
                                    22:09:46Task SchedulerRun new task: workbook path: C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    213.159.74.80doc_Pedido 02024091622008176.com.exeGet hashmaliciousQuasarBrowse
                                      doc_Zapytanie - Oferta POLSKA 91044PL.com.exeGet hashmaliciousQuasarBrowse
                                        doc_Zapytanie - Oferta KH 09281.com.exeGet hashmaliciousQuasarBrowse
                                          doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                            Client.exeGet hashmaliciousQuasarBrowse
                                              rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                  ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                                    Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                      4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                                        195.201.57.90SPt4FUjZMt.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, PythonCryptoHijacker, RedLineBrowse
                                                        • /?output=json
                                                        765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                        • /?output=json
                                                        765iYbgWn9.exeGet hashmaliciousLuca StealerBrowse
                                                        • /?output=json
                                                        WfKynArKjH.exeGet hashmaliciousAsyncRAT, Luca Stealer, MicroClip, RedLineBrowse
                                                        • /?output=json
                                                        ubes6SC7Vd.exeGet hashmaliciousUnknownBrowse
                                                        • ipwhois.app/xml/
                                                        cOQD62FceM.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                        • /?output=json
                                                        Clipper.exeGet hashmaliciousUnknownBrowse
                                                        • /?output=json
                                                        cOQD62FceM.exeGet hashmaliciousLuca StealerBrowse
                                                        • /?output=json
                                                        Cryptor.exeGet hashmaliciousLuca StealerBrowse
                                                        • /?output=json
                                                        Cryptor.exeGet hashmaliciousLuca Stealer, Rusty StealerBrowse
                                                        • /?output=json
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ipwho.ismtgjyX9gHF.exeGet hashmaliciousQuasarBrowse
                                                        • 108.181.98.179
                                                        SecuriteInfo.com.BackDoor.QuasarNET.3.14065.23993.exeGet hashmaliciousQuasarBrowse
                                                        • 195.201.57.90
                                                        http://ufvskbzrquea.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                        • 195.201.57.90
                                                        http://serviceappinfms12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                        • 195.201.57.90
                                                        http://1d807473.flca.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                        • 195.201.57.90
                                                        https://f0mlxe0jneh1.pages.dev/Get hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        https://bmrnyehuivryuaq.pages.dev/Get hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        https://jltnm7ux9ko.pages.dev/Get hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        http://irxpolrqchi.pages.dev/Get hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        http://v1bwdoexd1lj9stgmwip.pages.dev/Get hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        twart.myfirewall.orgdoc_Pedido 02024091622008176.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_Zapytanie - Oferta POLSKA 91044PL.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_Zapytanie - Oferta KH 09281.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        Client.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                                        • 213.159.74.80
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        HETZNER-ASDEfile.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 49.12.197.9
                                                        SecuriteInfo.com.Win32.Evo-gen.9961.31304.exeGet hashmaliciousUnknownBrowse
                                                        • 188.40.187.174
                                                        SecuriteInfo.com.Win32.Evo-gen.9961.31304.exeGet hashmaliciousUnknownBrowse
                                                        • 188.40.187.174
                                                        6JA2YPtbeB.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 49.12.197.9
                                                        hTR7xY0d0V.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 49.12.197.9
                                                        N83LFtMTUS.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 49.12.197.9
                                                        Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                        • 188.40.187.174
                                                        Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                        • 188.40.187.174
                                                        Confirmation transfer AGS # 22-0024.exeGet hashmaliciousGuLoaderBrowse
                                                        • 95.217.165.68
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 95.217.142.125
                                                        CTINET-ASCTINETAutonomousSystemRUdoc_Pedido 02024091622008176.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_Zapytanie - Oferta POLSKA 91044PL.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_Zapytanie - Oferta KH 09281.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        doc_rfq Oferta KH 09281.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        Client.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                                        • 213.159.74.80
                                                        4dALKsHYFM.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog Stealer, zgRATBrowse
                                                        • 213.159.74.80
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0ehttps://finalstepgetshere.com/uploads/beta9.zipGet hashmaliciousLummaCBrowse
                                                        • 195.201.57.90
                                                        https://k7qo.sarnerholz.cam/APRjVfmkGet hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        origin.bin.exeGet hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        origin.bin.exeGet hashmaliciousUnknownBrowse
                                                        • 195.201.57.90
                                                        Play_VM-Now(Tina.lawvey)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                                                        • 195.201.57.90
                                                        r20240913TRANSFERENCIA.vbsGet hashmaliciousGuLoaderBrowse
                                                        • 195.201.57.90
                                                        asegurar.vbsGet hashmaliciousRemcosBrowse
                                                        • 195.201.57.90
                                                        dcsegura.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                                                        • 195.201.57.90
                                                        asegura.vbsGet hashmaliciousRemcosBrowse
                                                        • 195.201.57.90
                                                        grace.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 195.201.57.90
                                                        No context
                                                        Process:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1415
                                                        Entropy (8bit):5.352427679901606
                                                        Encrypted:false
                                                        SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4qnE4KMRr:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzep
                                                        MD5:4841C0D3C179F238C6301E488857EF7E
                                                        SHA1:EF32128BCC7108E0E45F02810808109827645894
                                                        SHA-256:2275C89AE7F4E5DC29930739AF4103F609A15E4A9FD42737F29A3C213825B91A
                                                        SHA-512:DA9CF0EB1018AAD9894656E76B3FC19622BE5D050E303A8E360A33F5944520FDAABBF36DB03DD5EAD12426336A8BE0FCC97ABB95FB0179B200232A9A7FFA8B05
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                        Process:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1415
                                                        Entropy (8bit):5.352427679901606
                                                        Encrypted:false
                                                        SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4qnE4KMRr:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzep
                                                        MD5:4841C0D3C179F238C6301E488857EF7E
                                                        SHA1:EF32128BCC7108E0E45F02810808109827645894
                                                        SHA-256:2275C89AE7F4E5DC29930739AF4103F609A15E4A9FD42737F29A3C213825B91A
                                                        SHA-512:DA9CF0EB1018AAD9894656E76B3FC19622BE5D050E303A8E360A33F5944520FDAABBF36DB03DD5EAD12426336A8BE0FCC97ABB95FB0179B200232A9A7FFA8B05
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                        Process:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5786112
                                                        Entropy (8bit):6.257164224407044
                                                        Encrypted:false
                                                        SSDEEP:98304:HxwocXthR+h2+TeME4kHggCnRBUEVkcSfNV:wdGfeMej2yjcC
                                                        MD5:D5D0AB15509BCF177CB90288D995C308
                                                        SHA1:A5403D62A5D76FDB50C4D9F76B9DCCB97336C4C4
                                                        SHA-256:5155EC55E5E3C3BBA6CE9982F1DD8491A87CE819820B358D6F7388310116D84C
                                                        SHA-512:E6104BAE9160EAE1E11F0B737D6EB451FD9A65552EBC09E9A65F8A1646623B3CA2B2E53279413B14444876BC58960E714A29A45633DC43BD48D020C500A31293
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 61%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...o....................BX..........aX.. ....X...@.. ........................X...........`.................................laX.O.....X.......................X...................................................... ............... ..H............text....AX.. ...BX................. ..`.rsrc.........X......DX.............@..@.reloc........X......HX.............@..B.................aX.....H.......P.W.........l...<....?V............................................Bu.x.|V.O.#..~...3....0#&P.......t...7...x.E[...1.(.\.T.+."~Q..)..I.A..n/S.u.....k._.N..K...}.rc..`....c]U...6./{..;U..d.6..!.Sb..b.|/.u...lc..N..4...+O..l4(.{...?D..`.._.=.8e..U...#O.L>..nV. .m)...!..wD...%......}Y..m$.....;..v...~.K.}P..xZ_...9oD...x~..&...C..)..T6t.t.x.F..q..s.....S}B..I....9.m....%........h7.c../\..../:p+.7.J...,.."G.o~@.s....;x...#....q..H.`/.o.....3...
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):6.257164224407044
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        • DOS Executable Generic (2002/1) 0.01%
                                                        File name:Pedido09669281099195.com.exe
                                                        File size:5'786'112 bytes
                                                        MD5:d5d0ab15509bcf177cb90288d995c308
                                                        SHA1:a5403d62a5d76fdb50c4d9f76b9dccb97336c4c4
                                                        SHA256:5155ec55e5e3c3bba6ce9982f1dd8491a87ce819820b358d6f7388310116d84c
                                                        SHA512:e6104bae9160eae1e11f0b737d6eb451fd9a65552ebc09e9a65f8a1646623b3ca2b2e53279413b14444876bc58960e714a29a45633dc43bd48d020c500a31293
                                                        SSDEEP:98304:HxwocXthR+h2+TeME4kHggCnRBUEVkcSfNV:wdGfeMej2yjcC
                                                        TLSH:D746DFDA9EA63652D01776380F27C30D67AD1CB7EB018BC94983819BEA3D34EED581C5
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...o....................BX..........aX.. ....X...@.. ........................X...........`................................
                                                        Icon Hash:00928e8e8686b000
                                                        Entrypoint:0x9861be
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x10BD946F [Sat Nov 25 16:35:59 1978 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x58616c0x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5880000x3dc.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x58a0000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x5841c40x584200960115cef0944062329ec48fbac6889aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x5880000x3dc0x400dcec0fd313944afff8066da73881b728False0.4208984375data3.4284195555631842IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x58a0000xc0x200f2a908f6b8c4303fe920d5e451469462False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_VERSION0x5880580x384data0.44555555555555554
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-10-01T22:11:23.627127+02002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1213.159.74.809792192.168.2.649728TCP
                                                        2024-10-01T22:11:23.627127+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1213.159.74.809792192.168.2.649728TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 22:11:23.097173929 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:23.103008032 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.107064009 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:23.113248110 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:23.118017912 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.593128920 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.593446016 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.593514919 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:23.622034073 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:23.627126932 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.728507996 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:23.773863077 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:24.225706100 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:24.225752115 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:24.225841045 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:24.227042913 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:24.227058887 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.147114992 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.147203922 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:25.149030924 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:25.149040937 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.149239063 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.154810905 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:25.199410915 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.487003088 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.487051964 CEST44349729195.201.57.90192.168.2.6
                                                        Oct 1, 2024 22:11:25.487212896 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:25.547029972 CEST49729443192.168.2.6195.201.57.90
                                                        Oct 1, 2024 22:11:25.724705935 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:25.729655027 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:25.730720043 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:25.735712051 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:25.900762081 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:25.945744038 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:25.968885899 CEST979249728213.159.74.80192.168.2.6
                                                        Oct 1, 2024 22:11:26.055095911 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:50.977098942 CEST497289792192.168.2.6213.159.74.80
                                                        Oct 1, 2024 22:11:50.982042074 CEST979249728213.159.74.80192.168.2.6
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 22:11:23.072720051 CEST5593053192.168.2.61.1.1.1
                                                        Oct 1, 2024 22:11:23.087745905 CEST53559301.1.1.1192.168.2.6
                                                        Oct 1, 2024 22:11:24.123456955 CEST5273253192.168.2.61.1.1.1
                                                        Oct 1, 2024 22:11:24.130872011 CEST53527321.1.1.1192.168.2.6
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 1, 2024 22:11:23.072720051 CEST192.168.2.61.1.1.10xf40fStandard query (0)twart.myfirewall.orgA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:11:24.123456955 CEST192.168.2.61.1.1.10x312dStandard query (0)ipwho.isA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 1, 2024 22:11:23.087745905 CEST1.1.1.1192.168.2.60xf40fNo error (0)twart.myfirewall.org213.159.74.80A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 22:11:24.130872011 CEST1.1.1.1192.168.2.60x312dNo error (0)ipwho.is195.201.57.90A (IP address)IN (0x0001)false
                                                        • ipwho.is
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.649729195.201.57.904431456C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-01 20:11:25 UTC150OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                                        Host: ipwho.is
                                                        Connection: Keep-Alive
                                                        2024-10-01 20:11:25 UTC223INHTTP/1.1 200 OK
                                                        Date: Tue, 01 Oct 2024 20:11:25 GMT
                                                        Content-Type: application/json; charset=utf-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Server: ipwhois
                                                        Access-Control-Allow-Headers: *
                                                        X-Robots-Tag: noindex
                                                        2024-10-01 20:11:25 UTC1019INData Raw: 33 65 66 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72
                                                        Data Ascii: 3ef{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.33", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yor


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:16:07:57
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                                                        Imagebase:0xca0000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.3175567821.0000000005E50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.3172809908.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3177870932.0000000008DA4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.3173066316.0000000004351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3201879316.000000000B11B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3201879316.000000000AAE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:16:09:04
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                                                        Imagebase:0xca0000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2819041955.0000000000860000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000007.00000002.2819041955.0000000000542000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:16:09:07
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                                                        Imagebase:0xca0000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:16:09:10
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\Desktop\Pedido09669281099195.com.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Pedido09669281099195.com.exe"
                                                        Imagebase:0xca0000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:16:09:44
                                                        Start date:01/10/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                                        Imagebase:0x470000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:16:09:44
                                                        Start date:01/10/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff66e660000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:16:09:44
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                                        Imagebase:0xc10000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000C.00000002.4192431265.000000000A94D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000C.00000002.4162153464.0000000008B95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 0000000C.00000002.4156266240.0000000003451000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 61%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:16:09:46
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Imagebase:0xc10000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000D.00000002.4333289880.000000000AC49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000D.00000002.4333289880.000000000A92D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 0000000D.00000002.4299190110.000000000339C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000D.00000002.4307722200.0000000008C2F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:16:10:47
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                                        Imagebase:0xc10000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000E.00000002.4594281993.0000000003316000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:15
                                                        Start time:16:10:59
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                                        Imagebase:0xc10000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:16:11:02
                                                        Start date:01/10/2024
                                                        Path:C:\Users\user\AppData\Roaming\SubDir\workbook.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\SubDir\workbook.exe"
                                                        Imagebase:0xc10000
                                                        File size:5'786'112 bytes
                                                        MD5 hash:D5D0AB15509BCF177CB90288D995C308
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:16:11:22
                                                        Start date:01/10/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"schtasks" /create /tn "workbook" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\SubDir\workbook.exe" /rl HIGHEST /f
                                                        Imagebase:0x470000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:16:11:22
                                                        Start date:01/10/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff66e660000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:17.5%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:7.1%
                                                          Total number of Nodes:226
                                                          Total number of Limit Nodes:12
                                                          execution_graph 58771 7c10fc1 58773 7c10fd1 58771->58773 58772 7c119a9 58773->58772 58777 7c179d0 58773->58777 58782 7c179a0 58773->58782 58785 7c17990 58773->58785 58778 7c1798e 58777->58778 58779 7c179de 58777->58779 58788 7c14c10 58778->58788 58781 7c179bf 58781->58773 58783 7c14c10 3 API calls 58782->58783 58784 7c179bf 58782->58784 58783->58784 58784->58773 58786 7c14c10 3 API calls 58785->58786 58787 7c179bf 58786->58787 58787->58773 58789 7c14c1b 58788->58789 58793 1697938 58789->58793 58797 169483c 58789->58797 58790 7c17e4c 58790->58781 58795 1697943 58793->58795 58794 1697c39 58794->58790 58795->58794 58801 169c729 58795->58801 58798 1694847 58797->58798 58799 1697c39 58798->58799 58800 169c729 3 API calls 58798->58800 58799->58790 58800->58799 58802 169c759 58801->58802 58803 169c77d 58802->58803 58807 169c8e8 58802->58807 58811 169c8d7 58802->58811 58815 169c940 58802->58815 58803->58794 58808 169c8f5 58807->58808 58809 169c92f 58808->58809 58819 169b460 58808->58819 58809->58803 58812 169c8f5 58811->58812 58813 169c92f 58812->58813 58814 169b460 3 API calls 58812->58814 58813->58803 58814->58813 58816 169c900 58815->58816 58817 169c92f 58815->58817 58816->58817 58818 169b460 3 API calls 58816->58818 58817->58803 58818->58817 58820 169b465 58819->58820 58822 169d648 58820->58822 58823 169cc5c 58820->58823 58824 169cc67 58823->58824 58825 169483c 3 API calls 58824->58825 58826 169d6b7 58825->58826 58830 169f430 58826->58830 58836 169f448 58826->58836 58827 169d6f1 58827->58822 58831 169f44c 58830->58831 58832 169f485 58831->58832 58843 59709b0 58831->58843 58848 5970978 58831->58848 58854 59709c0 58831->58854 58832->58827 58838 169f479 58836->58838 58839 169f57a 58836->58839 58837 169f485 58837->58827 58838->58837 58840 59709b0 3 API calls 58838->58840 58841 59709c0 3 API calls 58838->58841 58842 5970978 3 API calls 58838->58842 58839->58827 58840->58839 58841->58839 58842->58839 58844 59709c0 58843->58844 58845 5970a9a 58844->58845 58859 59718e6 58844->58859 58869 5971792 58844->58869 58849 5970987 58848->58849 58850 59709ba 58848->58850 58849->58832 58851 5970a9a 58850->58851 58852 59718e6 3 API calls 58850->58852 58853 5971792 3 API calls 58850->58853 58852->58851 58853->58851 58855 59709eb 58854->58855 58856 5970a9a 58855->58856 58857 59718e6 3 API calls 58855->58857 58858 5971792 3 API calls 58855->58858 58857->58856 58858->58856 58860 59718b1 58859->58860 58860->58859 58861 5971925 CreateWindowExW 58860->58861 58862 59718b5 58860->58862 58865 5971a14 58861->58865 58866 59718e6 CreateWindowExW CreateWindowExW 58862->58866 58867 5971792 CreateWindowExW CreateWindowExW 58862->58867 58868 59718f0 CreateWindowExW 58862->58868 58864 59718d5 58864->58845 58865->58865 58866->58864 58867->58864 58868->58864 58870 597177b 58869->58870 58872 597179a 58869->58872 58870->58845 58871 59718af 58877 59718e6 CreateWindowExW CreateWindowExW 58871->58877 58878 5971792 CreateWindowExW CreateWindowExW 58871->58878 58879 59718f0 CreateWindowExW 58871->58879 58872->58871 58873 59718db CreateWindowExW 58872->58873 58876 5971a14 58873->58876 58874 59718d5 58874->58845 58876->58876 58877->58874 58878->58874 58879->58874 58933 7c12e20 58937 7c12e40 58933->58937 58942 7c12e50 58933->58942 58934 7c12e3f 58938 7c12e50 58937->58938 58939 7c12e72 58938->58939 58940 1697938 3 API calls 58938->58940 58941 169483c 3 API calls 58938->58941 58939->58934 58940->58939 58941->58939 58943 7c12e72 58942->58943 58944 1697938 3 API calls 58942->58944 58945 169483c 3 API calls 58942->58945 58943->58934 58944->58943 58945->58943 58946 1694708 58947 1694727 58946->58947 58950 1693ed4 58947->58950 58949 1694730 58951 1693edf 58950->58951 58954 16942d4 58951->58954 58953 1694b8b 58953->58949 58955 16942df 58954->58955 58958 16947dc 58955->58958 58957 1694c7d 58957->58953 58959 16947e7 58958->58959 58962 169480c 58959->58962 58961 1694d5a 58961->58957 58963 1694817 58962->58963 58964 169483c 3 API calls 58963->58964 58965 1694e5c 58964->58965 58965->58961 58966 12a1ac8 58967 12a1c53 58966->58967 58969 12a1aee 58966->58969 58969->58967 58970 12a1240 58969->58970 58971 12a1d48 PostMessageW 58970->58971 58972 12a1db4 58971->58972 58972->58969 58921 18df2c8 58922 18df30d Wow64SetThreadContext 58921->58922 58924 18df355 58922->58924 58973 5977971 58974 597798d 58973->58974 58978 597efb3 58974->58978 58984 597efc0 58974->58984 58975 5977999 58979 597efba 58978->58979 58983 597ef87 58978->58983 58980 597efdc 58979->58980 58979->58983 58990 597e52c CloseHandle 58980->58990 58982 597efe9 58982->58975 58983->58975 58985 597efce 58984->58985 58989 597ef87 58984->58989 58986 597efdc 58985->58986 58991 597e52c CloseHandle 58986->58991 58988 597efe9 58988->58975 58989->58975 58990->58982 58991->58988 58908 597f130 58909 597f138 CloseHandle 58908->58909 58910 597f19f 58909->58910 58911 5974030 58912 5974072 58911->58912 58914 5974079 58911->58914 58913 59740ca CallWindowProcW 58912->58913 58912->58914 58913->58914 58992 537b850 58993 537b864 58992->58993 59001 537b8dd 58993->59001 59002 18d377d 58993->59002 59006 18d2e02 58993->59006 59010 18d3597 58993->59010 59014 18d4527 58993->59014 59018 18d2aeb 58993->59018 59022 18d35ec 58993->59022 59026 18d2c9d 58993->59026 59030 18d4a48 59002->59030 59033 18d4a40 59002->59033 59003 18d3797 59008 18d4a48 VirtualProtect 59006->59008 59009 18d4a40 VirtualProtect 59006->59009 59007 18d2e13 59008->59007 59009->59007 59012 18d4a48 VirtualProtect 59010->59012 59013 18d4a40 VirtualProtect 59010->59013 59011 18d35ab 59012->59011 59013->59011 59016 18d4a48 VirtualProtect 59014->59016 59017 18d4a40 VirtualProtect 59014->59017 59015 18d4538 59016->59015 59017->59015 59020 18d4a48 VirtualProtect 59018->59020 59021 18d4a40 VirtualProtect 59018->59021 59019 18d2afc 59020->59019 59021->59019 59024 18d4a48 VirtualProtect 59022->59024 59025 18d4a40 VirtualProtect 59022->59025 59023 18d362a 59024->59023 59025->59023 59028 18d4a48 VirtualProtect 59026->59028 59029 18d4a40 VirtualProtect 59026->59029 59027 18d2cc1 59028->59027 59029->59027 59031 18d4a90 VirtualProtect 59030->59031 59032 18d4aca 59031->59032 59032->59003 59034 18d4a90 VirtualProtect 59033->59034 59035 18d4aca 59034->59035 59035->59003 59036 169ca00 59037 169ca46 GetCurrentProcess 59036->59037 59039 169ca98 GetCurrentThread 59037->59039 59041 169ca91 59037->59041 59040 169cad5 GetCurrentProcess 59039->59040 59042 169cace 59039->59042 59043 169cb0b 59040->59043 59041->59039 59042->59040 59044 169cb33 GetCurrentThreadId 59043->59044 59045 169cb64 59044->59045 58880 18de300 58881 18de340 VirtualAllocEx 58880->58881 58883 18de37d 58881->58883 58925 18de640 58926 18de688 WriteProcessMemory 58925->58926 58928 18de6df 58926->58928 59046 18deae0 59047 18deb28 VirtualProtectEx 59046->59047 59049 18deb66 59047->59049 58884 169a678 58887 169a770 58884->58887 58885 169a687 58888 169a7a4 58887->58888 58890 169a781 58887->58890 58888->58885 58889 169a9a8 GetModuleHandleW 58891 169a9d5 58889->58891 58890->58888 58890->58889 58891->58885 58892 18ddc18 58893 18ddc5d Wow64GetThreadContext 58892->58893 58895 18ddca5 58893->58895 58915 18df938 58916 18df978 ResumeThread 58915->58916 58918 18df9a9 58916->58918 58919 169d050 DuplicateHandle 58920 169d0e6 58919->58920 58896 18d7696 58897 18d7215 58896->58897 58898 18d75e1 58897->58898 58900 18d9cd0 58897->58900 58901 18d9cf7 58900->58901 58902 18d9dbb 58901->58902 58904 18dc058 58901->58904 58902->58897 58905 18dc0d7 CreateProcessAsUserW 58904->58905 58907 18dc1d8 58905->58907 58929 537c8e8 58930 537c8ed VirtualProtect 58929->58930 58932 537c96a 58930->58932

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 18dc5d8-18dc5fd 1 18dc5ff 0->1 2 18dc604-18dc628 0->2 1->2 3 18dc629 2->3 4 18dc630-18dc64c 3->4 5 18dc64e 4->5 6 18dc655-18dc656 4->6 5->3 5->6 7 18dc86d-18dc876 5->7 8 18dc7ae-18dc7b1 5->8 9 18dc6ee-18dc706 5->9 10 18dc6a8-18dc6b0 5->10 11 18dc74a-18dc77d call 18da918 5->11 12 18dc785-18dc788 call 18dc8e0 5->12 13 18dc681-18dc692 5->13 14 18dc81b-18dc84e call 18d5b68 5->14 15 18dc65b-18dc67f 5->15 16 18dc87b-18dc884 5->16 17 18dc856-18dc868 5->17 18 18dc7d0-18dc7e8 5->18 19 18dc732-18dc745 5->19 6->16 7->4 28 18dc7ba-18dc7cb 8->28 38 18dc719-18dc720 9->38 39 18dc708-18dc717 9->39 20 18dc6b7-18dc6c2 10->20 11->12 26 18dc78e-18dc7a9 12->26 35 18dc694-18dc6a6 13->35 36 18dc6b2-18dc6b4 13->36 14->17 15->4 17->4 33 18dc7fb-18dc802 18->33 34 18dc7ea-18dc7f9 18->34 19->4 23 18dc6d5-18dc6dc 20->23 24 18dc6c4-18dc6d3 20->24 37 18dc6e3-18dc6e9 23->37 24->37 26->4 28->4 42 18dc809-18dc816 33->42 34->42 35->4 36->20 37->4 41 18dc727-18dc72d 38->41 39->41 41->4 42->4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 004.1.4$e\1$e\1$"*p$"*p
                                                          • API String ID: 0-2377609781
                                                          • Opcode ID: 93bffce6c45d676fc4657b81a111ddc8a1b24ea645868babb73fcaaa1672128d
                                                          • Instruction ID: 2940f8f7ced14e309d4ebca250673f8671e7ab379b28d88228e6d091e0c3d74f
                                                          • Opcode Fuzzy Hash: 93bffce6c45d676fc4657b81a111ddc8a1b24ea645868babb73fcaaa1672128d
                                                          • Instruction Fuzzy Hash: A781E0B0D053198FCB14CFA9D9846AEBBB2AF88304F24942ED416BB254DB345A06CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 91 53735f8-5373644 94 537374c-537374e 91->94 95 537364a-5373744 91->95 96 5373755-5373765 94->96 97 5373750-5373753 94->97 95->94 103 5373767-537376d 96->103 104 537377a-5373790 96->104 99 5373793-5374bd2 call 5372b44 * 2 97->99 362 5376883 99->362 363 5374bd8-5374c60 call 5372b54 99->363 105 5373775-5373778 103->105 104->99 105->99 364 5376888-537689c 362->364 741 5374c66 call 5377643 363->741 742 5374c66 call 5377650 363->742 368 537689e-53768bd 364->368 371 53768be-53768de 368->371 372 5376920-5376967 371->372 373 53768e0-537691e 371->373 377 5376968-5376995 372->377 373->372 380 5376997-53769cc 377->380 382 53769ce-53769d1 380->382 383 53769fc-5376a10 380->383 384 53769d3-53769e8 382->384 385 53769ec-53769fa 382->385 387 5376a12-5376a16 383->387 388 5376a6d-5376aa0 383->388 384->385 385->383 389 5374c69-5374e5c 413 5374f56-5375044 389->413 414 5374e62-5374f51 389->414 435 5375047-53765d1 413->435 414->435 435->364 707 53765d7-53765f5 435->707 708 53765fc-5376712 707->708 708->364 720 5376718-537671d 708->720 721 537671f-5376737 720->721 722 537673c-5376813 720->722 723 537684e-5376882 721->723 722->364 737 5376815-5376848 722->737 737->723 741->389 742->389
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @$@
                                                          • API String ID: 0-149943524
                                                          • Opcode ID: 2d0dc8abd3ad7053cb9809ab15f19e5aee67df4175c9221c51b2ae0856bb42a1
                                                          • Instruction ID: dfbfbf20cf0effd12c71f0b8fb46bbfa4b0dce9948a228337cf62a6ac6e28180
                                                          • Opcode Fuzzy Hash: 2d0dc8abd3ad7053cb9809ab15f19e5aee67df4175c9221c51b2ae0856bb42a1
                                                          • Instruction Fuzzy Hash: 47537AB0E24659CBCB54EF78D89579DBBB5FF8A300F4084EAD448A7250DE386D84CB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 743 7cb750d-7cb7530 744 7cb74e9-7cb7504 743->744 745 7cb7532 743->745 746 7cb7539-7cb773b 745->746 747 7cb7534-7cb7537 745->747 771 7cb7742 746->771 747->746 772 7cb774a-7cb776f 771->772 775 7cb97d5-7cb9a83 772->775 776 7cb7775-7cb8488 772->776 843 7cb9a89-7cba960 775->843 844 7cba968-7cbb902 775->844 1175 7cb8808-7cb97cd 776->1175 1176 7cb848e-7cb8800 776->1176 843->844 1405 7cbbc88-7cbbc9b 844->1405 1406 7cbb908-7cbbc80 844->1406 1175->775 1176->1175 1410 7cbc2dd-7cbd152 1405->1410 1411 7cbbca1-7cbc2d5 1405->1411 1406->1405 1790 7cbd159-7cbd16f 1410->1790 1411->1410 1794 7cbd16f call 7cbebdd 1790->1794 1795 7cbd16f call 7cbebec 1790->1795 1796 7cbd16f call 7cbec10 1790->1796 1792 7cbd175-7cbd17c 1794->1792 1795->1792 1796->1792
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ccc7e43fc998982d9e9338a7cb5378265c0aaa7f371dd0eabff3ad92fe3d6a78
                                                          • Instruction ID: ab651211bda9c5a28365ab39d19d44a4a043e11e5a0638ee8ea6deb3ac5df40a
                                                          • Opcode Fuzzy Hash: ccc7e43fc998982d9e9338a7cb5378265c0aaa7f371dd0eabff3ad92fe3d6a78
                                                          • Instruction Fuzzy Hash: C9B31670B11628CBCB18EF38E9996ACBBB2FB89301F0045E9D449A3750DB395D94DF42

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1797 7cb7538-7cb776f 1826 7cb97d5-7cb9a83 1797->1826 1827 7cb7775-7cb8488 1797->1827 1894 7cb9a89-7cba960 1826->1894 1895 7cba968-7cbb902 1826->1895 2226 7cb8808-7cb97cd 1827->2226 2227 7cb848e-7cb8800 1827->2227 1894->1895 2456 7cbbc88-7cbbc9b 1895->2456 2457 7cbb908-7cbbc80 1895->2457 2226->1826 2227->2226 2461 7cbc2dd-7cbd16f 2456->2461 2462 7cbbca1-7cbc2d5 2456->2462 2457->2456 2845 7cbd16f call 7cbebdd 2461->2845 2846 7cbd16f call 7cbebec 2461->2846 2847 7cbd16f call 7cbec10 2461->2847 2462->2461 2843 7cbd175-7cbd17c 2845->2843 2846->2843 2847->2843
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9fb0c58745d47a83de6d77e8a5de8e2500643bd96684c403d1fc78c381169ab2
                                                          • Instruction ID: 82a9e75404497ee1b0e2b2d26fa42506ba51ed4c22d6987bbebf82a93f8bea9a
                                                          • Opcode Fuzzy Hash: 9fb0c58745d47a83de6d77e8a5de8e2500643bd96684c403d1fc78c381169ab2
                                                          • Instruction Fuzzy Hash: C6B31670B11628CBCB18EF38E9996ACBBB2FB89301F0045E9D449A3750DB395D94DF46

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2848 5373596-5374bd2 call 5372b44 * 2 3042 5376883 2848->3042 3043 5374bd8-5374c60 call 5372b54 2848->3043 3044 5376888-537689c 3042->3044 3421 5374c66 call 5377643 3043->3421 3422 5374c66 call 5377650 3043->3422 3048 537689e-53768bd 3044->3048 3051 53768be-53768de 3048->3051 3052 5376920-5376967 3051->3052 3053 53768e0-537691e 3051->3053 3057 5376968-5376995 3052->3057 3053->3052 3060 5376997-53769cc 3057->3060 3062 53769ce-53769d1 3060->3062 3063 53769fc-5376a10 3060->3063 3064 53769d3-53769e8 3062->3064 3065 53769ec-53769fa 3062->3065 3067 5376a12-5376a16 3063->3067 3068 5376a6d-5376aa0 3063->3068 3064->3065 3065->3063 3069 5374c69-5374e5c 3093 5374f56-5375044 3069->3093 3094 5374e62-5374f51 3069->3094 3115 5375047-53765d1 3093->3115 3094->3115 3115->3044 3387 53765d7-53765f5 3115->3387 3388 53765fc-5376712 3387->3388 3388->3044 3400 5376718-537671d 3388->3400 3401 537671f-5376737 3400->3401 3402 537673c-5376813 3400->3402 3403 537684e-5376882 3401->3403 3402->3044 3417 5376815-5376848 3402->3417 3417->3403 3421->3069 3422->3069
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: G
                                                          • API String ID: 0-985283518
                                                          • Opcode ID: b181aaa49ac21db1b730f6221b647b476962c3c1586da14e992922f3090d2d86
                                                          • Instruction ID: 1f7d249a609379302ef0e0978c07f4bf0637fd941b5210b979a453bcaca37681
                                                          • Opcode Fuzzy Hash: b181aaa49ac21db1b730f6221b647b476962c3c1586da14e992922f3090d2d86
                                                          • Instruction Fuzzy Hash: BF336AB0E20629CBCB54EF78D8957ADBBB5FB89300F4084E9D548A7250DE386D84CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4076 18d4b50-18d4b6a 4077 18d4b6c 4076->4077 4078 18d4b71-18d4c1c 4076->4078 4077->4078 4088 18d4c1f 4078->4088 4089 18d4c26-18d4c42 4088->4089 4090 18d4c4b-18d4c4c 4089->4090 4091 18d4c44 4089->4091 4093 18d4dbb-18d4dc1 4090->4093 4095 18d4c51-18d4c6b 4090->4095 4091->4088 4092 18d4c6d-18d4cad 4091->4092 4091->4093 4094 18d4d84-18d4d88 4091->4094 4091->4095 4096 18d4d30-18d4d6f 4091->4096 4105 18d4cb8-18d4cfd 4092->4105 4097 18d4d9b-18d4da2 4094->4097 4098 18d4d8a-18d4d99 4094->4098 4095->4089 4116 18d4d71 call 18d6331 4096->4116 4117 18d4d71 call 18d6340 4096->4117 4099 18d4da9-18d4db6 4097->4099 4098->4099 4099->4089 4113 18d4cff-18d4d0e 4105->4113 4114 18d4d10-18d4d17 4105->4114 4110 18d4d77-18d4d7f 4110->4089 4115 18d4d1e-18d4d2b 4113->4115 4114->4115 4115->4089 4116->4110 4117->4110
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 6f$6f
                                                          • API String ID: 0-3590766845
                                                          • Opcode ID: 4bf9c51e7d29d0495af54cb1c0a6bbc6c2532559422135e377c91b1c2b4c63d9
                                                          • Instruction ID: 65c9d615a29d7b430a1a8a85ec6fa29fc87dace9fcabd5d87a0acb0ed2b6d71d
                                                          • Opcode Fuzzy Hash: 4bf9c51e7d29d0495af54cb1c0a6bbc6c2532559422135e377c91b1c2b4c63d9
                                                          • Instruction Fuzzy Hash: 0A71C074E11208DFDB08DFA6D5856AEBBB2FF88301F24842AE406AB754DB345A41CF55

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4157 5971792-5971798 4158 597177b-5971780 4157->4158 4159 597179a-597179d 4157->4159 4160 59717d2-59717dd 4159->4160 4161 597179f-59717cf 4159->4161 4163 5971812-597181d 4160->4163 4164 59717df-59717fd 4160->4164 4161->4160 4167 5971852-597185f 4163->4167 4168 597181f-5971831 4163->4168 4169 5971832-597183d 4164->4169 4170 59717ff-5971811 4164->4170 4172 5971865-597186f 4167->4172 4168->4169 4168->4172 4174 5971872-5971879 4169->4174 4175 597183f 4169->4175 4170->4163 4171 5971845-5971851 4170->4171 4171->4167 4176 5971885-5971891 4171->4176 4172->4174 4179 59718ad 4174->4179 4180 597187b-597187f 4174->4180 4175->4171 4181 59718c5-59718cb 4176->4181 4182 5971893-5971899 4176->4182 4185 59718af-59718c3 4179->4185 4186 59718db-5971956 4179->4186 4180->4176 4183 59718cd 4181->4183 4182->4183 4184 597189b-59718ac 4182->4184 4201 59718d0 call 59718e6 4183->4201 4202 59718d0 call 5971792 4183->4202 4203 59718d0 call 59718f0 4183->4203 4184->4179 4185->4181 4187 5971961-5971968 4186->4187 4188 5971958-597195e 4186->4188 4190 5971973-5971a12 CreateWindowExW 4187->4190 4191 597196a-5971970 4187->4191 4188->4187 4189 59718d5-59718d6 4193 5971a14-5971a1a 4190->4193 4194 5971a1b-5971a53 4190->4194 4191->4190 4193->4194 4198 5971a55-5971a58 4194->4198 4199 5971a60 4194->4199 4198->4199 4200 5971a61 4199->4200 4200->4200 4201->4189 4202->4189 4203->4189
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 286bdcc41420c591600414bab31b3d836e818acc6f17eb2b3151e1b02bb7c06f
                                                          • Instruction ID: 266fc9afa1c2ebc9e12f672d55fd295cff7e29f981f5700c59b8000e2c227788
                                                          • Opcode Fuzzy Hash: 286bdcc41420c591600414bab31b3d836e818acc6f17eb2b3151e1b02bb7c06f
                                                          • Instruction Fuzzy Hash: C9A15E71809388DFCF06CFA9C890AD9BFB5BF5A300F1941DBE8449B262D7399815DB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4264 18dc058-18dc0e3 4266 18dc0ee-18dc0f5 4264->4266 4267 18dc0e5-18dc0eb 4264->4267 4268 18dc0f7-18dc0fd 4266->4268 4269 18dc100-18dc118 4266->4269 4267->4266 4268->4269 4270 18dc129-18dc1d6 CreateProcessAsUserW 4269->4270 4271 18dc11a-18dc126 4269->4271 4273 18dc1df-18dc25e 4270->4273 4274 18dc1d8-18dc1de 4270->4274 4271->4270 4281 18dc270-18dc277 4273->4281 4282 18dc260-18dc266 4273->4282 4274->4273 4283 18dc28e 4281->4283 4284 18dc279-18dc288 4281->4284 4282->4281 4284->4283
                                                          APIs
                                                          • CreateProcessAsUserW.KERNELBASE(?,?,?,0000000A,?,?,?,?,?,?,?), ref: 018DC1C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CreateProcessUser
                                                          • String ID:
                                                          • API String ID: 2217836671-0
                                                          • Opcode ID: e33a87dc79ac2219ce4a1d24daeb408383fa0a7fba06a170161b8ba56ef64e92
                                                          • Instruction ID: e8d4b4e068e699fd7e0f1bf37bf0342833f88a12bd4869f490867212f217f7ed
                                                          • Opcode Fuzzy Hash: e33a87dc79ac2219ce4a1d24daeb408383fa0a7fba06a170161b8ba56ef64e92
                                                          • Instruction Fuzzy Hash: 3251E571900229DFDF24CF99C840BEDBBB5BF48314F0485AAE908B7250DB759A89DF90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: kQD
                                                          • API String ID: 0-3066535408
                                                          • Opcode ID: 1fa21d1999fb0a0623c49e266ac895e2e6e834c52f1f30ba0218d09f2dec2d3e
                                                          • Instruction ID: ad7cf0baaafa541559175a63974c74e80ef275a34e564f9e71e7b672fdfaf364
                                                          • Opcode Fuzzy Hash: 1fa21d1999fb0a0623c49e266ac895e2e6e834c52f1f30ba0218d09f2dec2d3e
                                                          • Instruction Fuzzy Hash: 98C14874E1420EDFCB14CFA9C4818AEFBB6FF89341B1485A9D405AB215D738E982CF94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: kQD
                                                          • API String ID: 0-3066535408
                                                          • Opcode ID: ccfbbab50c2b7481fa66cf5e09c3f6767cf89df209c1478bfe0e240b8cb51c24
                                                          • Instruction ID: 6e18d1ca5cb2a8ec4c0b59ee87b8085b548ac1d67265cf892c20c30d36782c6b
                                                          • Opcode Fuzzy Hash: ccfbbab50c2b7481fa66cf5e09c3f6767cf89df209c1478bfe0e240b8cb51c24
                                                          • Instruction Fuzzy Hash: 61C11874D1420DDFCB14CFA9C5808AEFBB6FF89341B1485A9D415AB214D738E942CF95
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 6f
                                                          • API String ID: 0-3135077484
                                                          • Opcode ID: fed013680632037b0144a13211e9d7594b2a1abf11d5c9b7b4314467359dbb21
                                                          • Instruction ID: a5de3ce0ae4f87ee397277e3266584b229d0fa6eb5348d7309fc9bd5887f580f
                                                          • Opcode Fuzzy Hash: fed013680632037b0144a13211e9d7594b2a1abf11d5c9b7b4314467359dbb21
                                                          • Instruction Fuzzy Hash: E671D174E01308DFDB08DFA5D9955AEBFB2BF88301F24842AE806A7754DB305A41CF54
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: >NG
                                                          • API String ID: 0-1926143806
                                                          • Opcode ID: 008e8a8d7fbf631a247623a5d4226bcbdf34d8ff6e0f4199962ff27167a66211
                                                          • Instruction ID: 738589f646a03cd8404acb8deeddfbd5665bd275ed9a0eee29fffbf111b347f2
                                                          • Opcode Fuzzy Hash: 008e8a8d7fbf631a247623a5d4226bcbdf34d8ff6e0f4199962ff27167a66211
                                                          • Instruction Fuzzy Hash: 29517D70E052098FDB18CFAAC4806AEFBF2BF89301F14C56AD459B7250D7784941CFA4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: >NG
                                                          • API String ID: 0-1926143806
                                                          • Opcode ID: 3aa459d49405e532bcdc3db8453f7073ae88652ea1e93a4fe07eda52ecad34c6
                                                          • Instruction ID: 11bab162891345db12a9ebb55bcf520bff46bc32e075ccb6c9ece6040d62e271
                                                          • Opcode Fuzzy Hash: 3aa459d49405e532bcdc3db8453f7073ae88652ea1e93a4fe07eda52ecad34c6
                                                          • Instruction Fuzzy Hash: FA5128B0E152198FDB18CFAAC5406AEFBF2BF88301F14C52AD419B7654D7785A41CBA8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d896b8507089fdd4b45fb5c60f72381b044c388550d96b9cff30f7df0cdacb54
                                                          • Instruction ID: 410ab2fe1556f32687655ca35eb9cc3515f66f2aaf1139100530a686d18aa121
                                                          • Opcode Fuzzy Hash: d896b8507089fdd4b45fb5c60f72381b044c388550d96b9cff30f7df0cdacb54
                                                          • Instruction Fuzzy Hash: 35C27A70F20218CBCB14EFB8D8857ADBBB6FB89300F4085A9D449A7390DE396D45DB51
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: <
                                                          • API String ID: 0-4251816714
                                                          • Opcode ID: be24c715d946ed1763e5f8bdf97ba447dee1d0fc40ed0665eedda7cae04f23b9
                                                          • Instruction ID: 01df94b1725e2477ca1b654cd5b83c94c85d19d31091d60b75d347bf9ecf7c4f
                                                          • Opcode Fuzzy Hash: be24c715d946ed1763e5f8bdf97ba447dee1d0fc40ed0665eedda7cae04f23b9
                                                          • Instruction Fuzzy Hash: A0516475E01658CFDB58CFAAC9446DDBBF2AFC9301F14C0AAD409AB264EB345A85CF40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: <
                                                          • API String ID: 0-4251816714
                                                          • Opcode ID: 7d5d1afcb201485d5b6b24d10aea29605ad4dc03b8b96591d1c8e56e29e48aa1
                                                          • Instruction ID: c24ba26e285711677bdc8db056d62af9e4d098627dc5fbee29410234baa1bb39
                                                          • Opcode Fuzzy Hash: 7d5d1afcb201485d5b6b24d10aea29605ad4dc03b8b96591d1c8e56e29e48aa1
                                                          • Instruction Fuzzy Hash: 945156B5D01658CFDB58CFAAC9546DDBBF2BF89301F14C0AAD409AB264EB345A85CF40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177024412.0000000007C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7c10000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8dc946535b729168ef810390d868cbe4f117acb5486577ac80ce0b13e7176f06
                                                          • Instruction ID: 1f2527f758c9de39bcb2edf4e10c9a5ef6f8c57189721a004708d75d2554a96e
                                                          • Opcode Fuzzy Hash: 8dc946535b729168ef810390d868cbe4f117acb5486577ac80ce0b13e7176f06
                                                          • Instruction Fuzzy Hash: 03526C70A00346CFDB14DF28C854B99B7B2FF8A314F2586A9D5586F3A1DB71A982CF41
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177024412.0000000007C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7c10000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4c1e7c83065fe8655a733cac1e321bd9067547a1d4bf7b0735efa95a58a037c7
                                                          • Instruction ID: 47518b313166c66882fe4e18fddcdc6d927f61e76822901656a3f7a7e8c7e5ef
                                                          • Opcode Fuzzy Hash: 4c1e7c83065fe8655a733cac1e321bd9067547a1d4bf7b0735efa95a58a037c7
                                                          • Instruction Fuzzy Hash: A2526C30A00746CFDB14DF28C854B99B7B2FF89314F2586A9D5586F3A1DB71A982CF81
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 78d33cba1738f02b48a64c599dd1e0d1fc1e3eafc40e621718d810121104e548
                                                          • Instruction ID: d49d04d9ab8e65be39ca659166ec249270ec10d6a836c8da6503f947bc089e0c
                                                          • Opcode Fuzzy Hash: 78d33cba1738f02b48a64c599dd1e0d1fc1e3eafc40e621718d810121104e548
                                                          • Instruction Fuzzy Hash: D9226770A0125ACFDB19DF69C980B9DBBF6FF88304F14D9A9D509AB210D730AE858F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171681519.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_12a0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 25abd5a19fb2ce2d2005cd2f4254d3d02e29196ba923ed135d52156bbbccde2e
                                                          • Instruction ID: d4c5b96f28496db007ea27e2344baa00d9d92c222638933ecbb78af976f3aa05
                                                          • Opcode Fuzzy Hash: 25abd5a19fb2ce2d2005cd2f4254d3d02e29196ba923ed135d52156bbbccde2e
                                                          • Instruction Fuzzy Hash: BBD1BD317107028FEB29DB79C850BAEB7FAAF89301F54846DE246DB2A0CB35E901C755
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c2bb2c726dd0a432453375453ee146c2adc5ff3c3e14fed2c9da87036e19d29d
                                                          • Instruction ID: acca63daf3a07b3e4a9ecf82ce57befdbd5a5a60171fa9aac321784ac0ebff9b
                                                          • Opcode Fuzzy Hash: c2bb2c726dd0a432453375453ee146c2adc5ff3c3e14fed2c9da87036e19d29d
                                                          • Instruction Fuzzy Hash: F9E11670A0226ACFDB64CF65C88479DBBB6BF88304F1095EAD50EA7214D730AF818F44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 95e044270082a415d2de4a629ce9efe59a87d8a8ca0c233fa2816d9783e412ca
                                                          • Instruction ID: 8615bd6025769e7a1263874966f1de0b7750a28afac1ea1a433236655afd2492
                                                          • Opcode Fuzzy Hash: 95e044270082a415d2de4a629ce9efe59a87d8a8ca0c233fa2816d9783e412ca
                                                          • Instruction Fuzzy Hash: 91B19D70A007069FCB15EF79D890A6EBBF6FF88310B14896ED446DB351EB74A805CB94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 58b52f5d18a9db4a6ae61fe1472cb06b3b9de8e8a75cd7b3ebd4e792b068a0bd
                                                          • Instruction ID: fa2a823b9dd91698e43b468627f374b2d27c50be83a7fba444d21b646eef6ae4
                                                          • Opcode Fuzzy Hash: 58b52f5d18a9db4a6ae61fe1472cb06b3b9de8e8a75cd7b3ebd4e792b068a0bd
                                                          • Instruction Fuzzy Hash: 5BC1F674A5226ACFDB65CF24C98579CBBB6BB88304F1095EAD50AA7214D730AFC1CF44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cfc9eac03e3c8f5a20218bb0fa11f062b93d875d2adbd155038dc703a16e23ca
                                                          • Instruction ID: b765930bc49df8339eeb11831bc204834440e7df032072352455bc6d077ca865
                                                          • Opcode Fuzzy Hash: cfc9eac03e3c8f5a20218bb0fa11f062b93d875d2adbd155038dc703a16e23ca
                                                          • Instruction Fuzzy Hash: 51A18435E0031ACFCB04DFB5D8949DDB7BAFF89310F15861AE416AB2A4DB31A941DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8e9c7861cf72971a880c484d0f72609a76caecaa9277780e60b47637aadeed2d
                                                          • Instruction ID: 9342217df503588b7351f9452e930bb2d0e2d04df09fb45b844d2b607203302c
                                                          • Opcode Fuzzy Hash: 8e9c7861cf72971a880c484d0f72609a76caecaa9277780e60b47637aadeed2d
                                                          • Instruction Fuzzy Hash: FFA1F3B4E15308DFCB14CFAAD5856ADBBB2FB89304F20912AE416FB254DB349A01CF55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 32981c7b6eab9dca9bfc26f19cd26435a933bb36959040fd87c4580482a4e8f1
                                                          • Instruction ID: bc202574c23588c9fcdd13a24ffcdcf78a52362ab85c9dd9594de511a2a4744e
                                                          • Opcode Fuzzy Hash: 32981c7b6eab9dca9bfc26f19cd26435a933bb36959040fd87c4580482a4e8f1
                                                          • Instruction Fuzzy Hash: 4FA1F474E042098FDB08CFA9C890AAEBBB2FF88310F24942AD419BB365D7349905CF55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8d1b205bb74624fe85da9b6bb7056fbb68968462a75d991556456a16e8258c0d
                                                          • Instruction ID: c4b10d0651ccc569ca183091bb2dafa6f1ebb85783d88b8c7e39a18cff4f962c
                                                          • Opcode Fuzzy Hash: 8d1b205bb74624fe85da9b6bb7056fbb68968462a75d991556456a16e8258c0d
                                                          • Instruction Fuzzy Hash: 1F916135E0031ADFCB04DFB0D8949DDBBBAFF89310F15861AE416AB2A4DB71A941DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 78927dfc485842e548547395c8e77b47483851e8c753a6eae1589b22d8ad8b88
                                                          • Instruction ID: 81c35e011bb50ea46716033ba2a4e46969e6709b5e895390cfcee9b20af4b89d
                                                          • Opcode Fuzzy Hash: 78927dfc485842e548547395c8e77b47483851e8c753a6eae1589b22d8ad8b88
                                                          • Instruction Fuzzy Hash: 4F91C574E002098FDB18CFAAC994A9EFBB6FF88310F24942AD419BB354DB749945CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7193d2eadc6315a3f801c6a0b3b10aa369fcd0610964f53e15de1e4aa0ed71f3
                                                          • Instruction ID: d9a27b814ec12e878884f8821d404d1d56c81d7c12961a07d79ebc0c65e83b30
                                                          • Opcode Fuzzy Hash: 7193d2eadc6315a3f801c6a0b3b10aa369fcd0610964f53e15de1e4aa0ed71f3
                                                          • Instruction Fuzzy Hash: 9D61E1B0D1131DDFDB04CFE5DA45AAEBBB1FB48305F20892AE412A7250EB785A41CF95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 751a8efd00d8c7232e4816eddaaf39a41552cb54a16ee5e45a0317f0e3b1f4ec
                                                          • Instruction ID: 5a9b02f72e40689048fb8d4523f90a8154680d361033b2521c5230fa73fd6519
                                                          • Opcode Fuzzy Hash: 751a8efd00d8c7232e4816eddaaf39a41552cb54a16ee5e45a0317f0e3b1f4ec
                                                          • Instruction Fuzzy Hash: C6611270D1530DDFDB08CFA5D9456AEBBB1FB49308F24892AE412E7250EB789A41CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 89e7ca64028e479a74fd4df79b72ec0ca5d451526d1a32fa23623fcbfa5a6d6f
                                                          • Instruction ID: 3df9519877ebcb8b0b0b4f95626ec3eb3aab168ab89feb77df9eb4bc4aaa350e
                                                          • Opcode Fuzzy Hash: 89e7ca64028e479a74fd4df79b72ec0ca5d451526d1a32fa23623fcbfa5a6d6f
                                                          • Instruction Fuzzy Hash: DD512AB1D15218CFDB64CF66C884ADEBBF6FF89310F1480A9D409AB254DB346A85CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9540537c4ae9484cb6dc572d77189cd13d28486912c7324b11a03ccaaf7864f0
                                                          • Instruction ID: e9f4e9d819e2b35ec62df6c8031f459f61af4eeb451e9214de4615e6b094bb45
                                                          • Opcode Fuzzy Hash: 9540537c4ae9484cb6dc572d77189cd13d28486912c7324b11a03ccaaf7864f0
                                                          • Instruction Fuzzy Hash: 52415C70E052588FDB28CFA6C8846DEFBF6BF89310F14C4AAD405AB254DB385A85CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 89ebba1e36021939324c89347458f346f5415bf1fb938cc58f7564865f3f4007
                                                          • Instruction ID: 98d2fa085d1749f3ee6291b59d7b981bbb5a5b9883a946e8eb74bec23d5be985
                                                          • Opcode Fuzzy Hash: 89ebba1e36021939324c89347458f346f5415bf1fb938cc58f7564865f3f4007
                                                          • Instruction Fuzzy Hash: 4F41B6B5E047188BDB58CFAAC9446DEBBF2BF89310F14C0AAD848A7254DB305A85CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 034c8b5d1faf720393e573792c0da5b90fb9bb74ed5a2ea74dca38f28627e0b9
                                                          • Instruction ID: f54d171b4398bce908086bfe3609a184c38777938f0fc73700338d32c2160fa4
                                                          • Opcode Fuzzy Hash: 034c8b5d1faf720393e573792c0da5b90fb9bb74ed5a2ea74dca38f28627e0b9
                                                          • Instruction Fuzzy Hash: F631DCB1E006198BDB58DF6BD84479EBBF7AFC8200F14C4AAD408B7254DB345A458F51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5c6e8f9e779a6757db4114ad5a36bbebd2b88ceb60f1b79da8881b457d56acb6
                                                          • Instruction ID: b77d5a5e6c65ad8a9d9cf705dc1cec807d5dc1377d995b993632117001717c94
                                                          • Opcode Fuzzy Hash: 5c6e8f9e779a6757db4114ad5a36bbebd2b88ceb60f1b79da8881b457d56acb6
                                                          • Instruction Fuzzy Hash: ED21B971E016188BEB58CF6BDC4469EFBF7AFC8300F04C1BAD508A6264DB341A558F51

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0169CA7E
                                                          • GetCurrentThread.KERNEL32 ref: 0169CABB
                                                          • GetCurrentProcess.KERNEL32 ref: 0169CAF8
                                                          • GetCurrentThreadId.KERNEL32 ref: 0169CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 5f33fe4aafd43b7c5ce42c07d4efc070a3be83009b760c32253fc60a3bb83133
                                                          • Instruction ID: d0b4595db6d4a55a127531a830500c2d347384b370b63cb4b3de5be68000532a
                                                          • Opcode Fuzzy Hash: 5f33fe4aafd43b7c5ce42c07d4efc070a3be83009b760c32253fc60a3bb83133
                                                          • Instruction Fuzzy Hash: 035188B09012498FDB54DFA9D988B9EBBF5EF48304F24C459E409AB3A0D7385948CB65

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0169CA7E
                                                          • GetCurrentThread.KERNEL32 ref: 0169CABB
                                                          • GetCurrentProcess.KERNEL32 ref: 0169CAF8
                                                          • GetCurrentThreadId.KERNEL32 ref: 0169CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 7eacbbc667ac32c32c96f9dc18ee3e49a61f794cb511cd6b129b9648c986c475
                                                          • Instruction ID: d8c7b25984f7b748ab55163d0f087d6e50da18e1e2e5ae9912c423b5acc8b00b
                                                          • Opcode Fuzzy Hash: 7eacbbc667ac32c32c96f9dc18ee3e49a61f794cb511cd6b129b9648c986c475
                                                          • Instruction Fuzzy Hash: DA5187B09012098FDB44DFADD988B9EBBF5EF88304F24C459E409AB3A0D7745948CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4204 169a770-169a77f 4205 169a7ab-169a7af 4204->4205 4206 169a781-169a78e call 1699ac0 4204->4206 4207 169a7b1-169a7bb 4205->4207 4208 169a7c3-169a804 4205->4208 4213 169a790 4206->4213 4214 169a7a4 4206->4214 4207->4208 4215 169a811-169a81f 4208->4215 4216 169a806-169a80e 4208->4216 4262 169a796 call 169a9f8 4213->4262 4263 169a796 call 169aa08 4213->4263 4214->4205 4217 169a821-169a826 4215->4217 4218 169a843-169a845 4215->4218 4216->4215 4222 169a828-169a82f call 1699acc 4217->4222 4223 169a831 4217->4223 4221 169a848-169a84f 4218->4221 4219 169a79c-169a79e 4219->4214 4220 169a8e0-169a8ed 4219->4220 4234 169a8f4-169a958 4220->4234 4225 169a85c-169a863 4221->4225 4226 169a851-169a859 4221->4226 4224 169a833-169a841 4222->4224 4223->4224 4224->4221 4228 169a870-169a879 call 1699adc 4225->4228 4229 169a865-169a86d 4225->4229 4226->4225 4235 169a87b-169a883 4228->4235 4236 169a886-169a88b 4228->4236 4229->4228 4254 169a95a-169a9a0 4234->4254 4235->4236 4237 169a8a9-169a8ad 4236->4237 4238 169a88d-169a894 4236->4238 4260 169a8b0 call 169ad08 4237->4260 4261 169a8b0 call 169ace2 4237->4261 4238->4237 4240 169a896-169a8a6 call 1699aec call 1699afc 4238->4240 4240->4237 4241 169a8b3-169a8b6 4244 169a8d9-169a8df 4241->4244 4245 169a8b8-169a8d6 4241->4245 4245->4244 4255 169a9a8-169a9d3 GetModuleHandleW 4254->4255 4256 169a9a2-169a9a5 4254->4256 4257 169a9dc-169a9f0 4255->4257 4258 169a9d5-169a9db 4255->4258 4256->4255 4258->4257 4260->4241 4261->4241 4262->4219 4263->4219
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0169A9C6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 896fa3db8248bcd25e5292a74d5dd794973579715529bc97c7a317f81daf5f89
                                                          • Instruction ID: 603d1abad8c1c5d7c1bf19875f4f1bb4dbc6c2f1594c3184b3e7875e7faa3b6e
                                                          • Opcode Fuzzy Hash: 896fa3db8248bcd25e5292a74d5dd794973579715529bc97c7a317f81daf5f89
                                                          • Instruction Fuzzy Hash: F9814570A00B058FDB24DF69C94076ABBF5FF88310F10892DD5868BB50DB75E806CB90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4286 59718e6-59718e9 4287 597191d 4286->4287 4288 59718eb-5971917 4286->4288 4287->4286 4289 597191e-5971924 4287->4289 4288->4287 4290 5971925-5971956 4289->4290 4291 59718b1-59718b3 4289->4291 4292 5971961-5971968 4290->4292 4293 5971958-597195e 4290->4293 4294 59718b5-59718cb 4291->4294 4295 59718d9-59718e3 4291->4295 4297 5971973-59719ab 4292->4297 4298 597196a-5971970 4292->4298 4293->4292 4299 59718cd 4294->4299 4295->4286 4300 59719b3-5971a12 CreateWindowExW 4297->4300 4298->4297 4310 59718d0 call 59718e6 4299->4310 4311 59718d0 call 5971792 4299->4311 4312 59718d0 call 59718f0 4299->4312 4302 5971a14-5971a1a 4300->4302 4303 5971a1b-5971a53 4300->4303 4301 59718d5-59718d6 4302->4303 4307 5971a55-5971a58 4303->4307 4308 5971a60 4303->4308 4307->4308 4309 5971a61 4308->4309 4309->4309 4310->4301 4311->4301 4312->4301
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05971A02
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 79c8061be73b61feb18340d2ec631dad4f19cac1f79de357d2a950c8affaf2e3
                                                          • Instruction ID: 49826d3ea7160bbb37b7bc7ff9a6245f4a3e22f2027179c543094c2382a23cef
                                                          • Opcode Fuzzy Hash: 79c8061be73b61feb18340d2ec631dad4f19cac1f79de357d2a950c8affaf2e3
                                                          • Instruction Fuzzy Hash: B5510FB1C00349DFCB15CF99D984ADEBFB6BF48300F24816AE808AB220D7359845DF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4313 59718f0-5971956 4314 5971961-5971968 4313->4314 4315 5971958-597195e 4313->4315 4316 5971973-5971a12 CreateWindowExW 4314->4316 4317 597196a-5971970 4314->4317 4315->4314 4319 5971a14-5971a1a 4316->4319 4320 5971a1b-5971a53 4316->4320 4317->4316 4319->4320 4324 5971a55-5971a58 4320->4324 4325 5971a60 4320->4325 4324->4325 4326 5971a61 4325->4326 4326->4326
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05971A02
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 361346baf845cfa1714ab0b8cd45e4409f51cf46cff045ee165997879e21b8a8
                                                          • Instruction ID: 6bc3459b77abb6024ff8bbf1ce6a301591826c97da583d9d5a458cbf76ccb0a8
                                                          • Opcode Fuzzy Hash: 361346baf845cfa1714ab0b8cd45e4409f51cf46cff045ee165997879e21b8a8
                                                          • Instruction Fuzzy Hash: F341BEB5D0034DDFDB14CF99C984ADEBBB5BF88310F24822AE819AB210D775A945CF90
                                                          APIs
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 059740F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CallProcWindow
                                                          • String ID:
                                                          • API String ID: 2714655100-0
                                                          • Opcode ID: ef2a5fa35990b1292e02d3378baee30f7c7f101e2be6296d857d5f759f539ed7
                                                          • Instruction ID: 82e739668d691394c0e72a881c241707bcb634639079136c961137db16d9956f
                                                          • Opcode Fuzzy Hash: ef2a5fa35990b1292e02d3378baee30f7c7f101e2be6296d857d5f759f539ed7
                                                          • Instruction Fuzzy Hash: 0E414BB8900309CFCB14DF99C488AAABBF5FB88314F25C459D519AB321D335A841CFA0
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0537C95B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 1ac22bfe8d479b9ec438d92c54744113ea6ce91d7368febe105ab2c9bcaa4c3e
                                                          • Instruction ID: 1f1f0943da4a4feb6400230d3e15e741e34971b7cb524f11985079ee04af8fdc
                                                          • Opcode Fuzzy Hash: 1ac22bfe8d479b9ec438d92c54744113ea6ce91d7368febe105ab2c9bcaa4c3e
                                                          • Instruction Fuzzy Hash: 3A213975C047899FCB11CFA9D895BDEBFF4AB49310F14806AE858E7251D3389944CFA1
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 018DE6D0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 4a8a80cdcb18e0d31f06b1baac55027e3e3f8c5390ad2f07974958e9bc496cfe
                                                          • Instruction ID: c20feafe8d6d383283236eb9e36f9e015df2f6d5926eb134ed088e77d6128127
                                                          • Opcode Fuzzy Hash: 4a8a80cdcb18e0d31f06b1baac55027e3e3f8c5390ad2f07974958e9bc496cfe
                                                          • Instruction Fuzzy Hash: 0A2125759003099FDF10DFA9D885BDEBBF5FF48310F54882AEA19A7240D7789A54CBA0
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 018DF346
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 938303a0db52c533928a8c02831726d8119eb89d7ead0314117bfabc61ac2749
                                                          • Instruction ID: d541f016b47b0e6f8432a00279633afc55c17d866032a69c5582c0cd1733d751
                                                          • Opcode Fuzzy Hash: 938303a0db52c533928a8c02831726d8119eb89d7ead0314117bfabc61ac2749
                                                          • Instruction Fuzzy Hash: 40211571D003098FDB14DFAAC4857AEBBF4AF88314F54842AD659A7240DB78AA45CFA1
                                                          APIs
                                                          • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 018DDC96
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 3fbdcc4f4eacb59e8a424c2de23815f01e3dba018a4c322890ebd0c0e2ff838f
                                                          • Instruction ID: 97e1cb5f8558c8f784b6434435d5602b6ef5ff9d9b3bd0e81897b6a4d83b62d6
                                                          • Opcode Fuzzy Hash: 3fbdcc4f4eacb59e8a424c2de23815f01e3dba018a4c322890ebd0c0e2ff838f
                                                          • Instruction Fuzzy Hash: 1B213871D003098FDB10DFAAC5857AEBBF4AF48310F14842AD519A7240D7789944CFA0
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0169D0D7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: aea17c05df778773effd87b20fceeb697ec7baf5f04b0db5ba617f207e86ad83
                                                          • Instruction ID: 0698bb872291f59ca5456132894d772f819b5dc66309f0201456ba4301cd00e0
                                                          • Opcode Fuzzy Hash: aea17c05df778773effd87b20fceeb697ec7baf5f04b0db5ba617f207e86ad83
                                                          • Instruction Fuzzy Hash: FC21E3B5900249DFDB10CFA9D984AEEBBF4FB48310F14846AE918A7350D378A954CF61
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0169D0D7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 61f50648aae6c00ca96fd498ae6ad39df0c8e4653c4d718ce3019823b301b684
                                                          • Instruction ID: b6f600857af8b68a36c4f85eedd040487cb7aba13ca1898f421f5b6e540749d8
                                                          • Opcode Fuzzy Hash: 61f50648aae6c00ca96fd498ae6ad39df0c8e4653c4d718ce3019823b301b684
                                                          • Instruction Fuzzy Hash: DD21C4B5900249DFDB10CFAAD984ADEFFF8EB48310F14841AE918A7350D379A954CFA5
                                                          APIs
                                                          • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 018DEB57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: a16ddddc028bcdde61f7cf39ddbd45b7dad778e10f25d9e60c2da200a84e2938
                                                          • Instruction ID: dfd22c136a77430fa7b4d550ccab3b52b93703b59a5d2d9ddc5043bac083d3e6
                                                          • Opcode Fuzzy Hash: a16ddddc028bcdde61f7cf39ddbd45b7dad778e10f25d9e60c2da200a84e2938
                                                          • Instruction Fuzzy Hash: 89211571C003099FDB10DFAAD884BEEBBF5EF48320F14842AD519A7240D779A944DFA1
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 018D4ABB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 9662a58d8058553410103c0c0f0a49ce7a9e5bf7d6c247800ee06f15f234b391
                                                          • Instruction ID: b08a32b102dff32bd9f9ff739f63687e70eee2875c638f15f446480b48e41f81
                                                          • Opcode Fuzzy Hash: 9662a58d8058553410103c0c0f0a49ce7a9e5bf7d6c247800ee06f15f234b391
                                                          • Instruction Fuzzy Hash: 9A2124B59002499FDB10CFAAD484BDEFFF4EF48310F14842AE558A7650D338AA45CFA5
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0537C95B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 8f9d071b51eee29de63d60e15787fef346717c605d8daa365812eec5385002af
                                                          • Instruction ID: e917268cf427a17c5ee0c52d8bacaf4f69d4c03c53c6e58295baa3282133483b
                                                          • Opcode Fuzzy Hash: 8f9d071b51eee29de63d60e15787fef346717c605d8daa365812eec5385002af
                                                          • Instruction Fuzzy Hash: B32106759002499FCB10DF9AD584BDEFBF4FB48310F108429E958A7250D378A944CFA1
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 018D4ABB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 1366df3ae798bf26e82d9082d262429ab305d1a09f3741bd73e326d5bdd8c68e
                                                          • Instruction ID: f8436d5cd2c239b068041c967bca20048691ae4564b286b08b41572648c0ca15
                                                          • Opcode Fuzzy Hash: 1366df3ae798bf26e82d9082d262429ab305d1a09f3741bd73e326d5bdd8c68e
                                                          • Instruction Fuzzy Hash: ED2117759003499FDB10DF9AD484BDEFBF4FB48310F108429E958A7650D378A644CFA5
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 018DE36E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: d90c9ea30e66223972b4bd816d6279b157bd738f5f275c138269d58ca54c702c
                                                          • Instruction ID: ffd19776b3c306d619255782e124596d70819f176d10d1a964cc6f83301d4a12
                                                          • Opcode Fuzzy Hash: d90c9ea30e66223972b4bd816d6279b157bd738f5f275c138269d58ca54c702c
                                                          • Instruction Fuzzy Hash: D31159718003099FDB14DFA9D8447DFBBF5AF48310F148819D519A7250C7759900CFA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: eb9d0545fe0d17818f4247e2a0fd2eef1b06154b92a17dea80abd79f27d0b636
                                                          • Instruction ID: b7a9c989a3cc576d70d8b9084cf82598d481cfdf6c5e8006ec2f715ec2cc531c
                                                          • Opcode Fuzzy Hash: eb9d0545fe0d17818f4247e2a0fd2eef1b06154b92a17dea80abd79f27d0b636
                                                          • Instruction Fuzzy Hash: 7F116A71D003098FDB10DFAAD84479FFBF4AF88310F24881AC619A7240C7796904CFA4
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 012A1DA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171681519.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_12a0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: d776d80d5aebe084c942dec940502bbe92d54d703c8ca564942784ca14f339d5
                                                          • Instruction ID: d227e8af6897ecf6a6f47edc02fa867db2025c35a8c3aa3f347b4dbbb3a7b265
                                                          • Opcode Fuzzy Hash: d776d80d5aebe084c942dec940502bbe92d54d703c8ca564942784ca14f339d5
                                                          • Instruction Fuzzy Hash: 1D1122B58003499FDB10DF99D485BDEBBF4EB48320F20841AEA18A7200C379A944CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 012A1DA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171681519.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_12a0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 8914be9b7e996bfdc0361a117fe760dded4e66384b59d6ce8a4a7a57bd527216
                                                          • Instruction ID: 3a5e4cd00f66e35397abb9c6a66ac952025b28c55076cd9b5738ab845e6a179b
                                                          • Opcode Fuzzy Hash: 8914be9b7e996bfdc0361a117fe760dded4e66384b59d6ce8a4a7a57bd527216
                                                          • Instruction Fuzzy Hash: 9E1122B58007499FDB10DF9AC489BDEBBF8EB48320F108419EA18A7200C379A954CFA1
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0169A9C6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 59a3551033a44022cd0bc02411bd46677a54f079889d1e8ed1659e9af7a38205
                                                          • Instruction ID: 3d72b4fdfbca3629a41c5d36d2cbd24d999f8c4385517dc1191709b972a37f98
                                                          • Opcode Fuzzy Hash: 59a3551033a44022cd0bc02411bd46677a54f079889d1e8ed1659e9af7a38205
                                                          • Instruction Fuzzy Hash: CE1110B9C006498FDB10DF9AD844BDEFBF8AB88320F15852AD918B7700C379A545CFA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @
                                                          • API String ID: 0-2766056989
                                                          • Opcode ID: d9a206171c863da02ae8fd397adbd5690f4ad6a65d220e49f40ef4027aa064c5
                                                          • Instruction ID: bbcab20abd6d1cc5d0938895dc5f5cc89a97fe63472660c452ad2c7b85a4a9c5
                                                          • Opcode Fuzzy Hash: d9a206171c863da02ae8fd397adbd5690f4ad6a65d220e49f40ef4027aa064c5
                                                          • Instruction Fuzzy Hash: EB41889160E3D14FD307577898246993FB1AF87115F1E41DBD182CF6E3D9198C0A8367
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,0597EFE9,?,?), ref: 0597F190
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: a4c792ccecd503e8d272473eaa10bfe531a4f554391dbe88db9361097cdb3c02
                                                          • Instruction ID: 28dc3009d251c4e579f2e090fb4f0791a95d44fdbde4c578ef93f46a95d4f8bd
                                                          • Opcode Fuzzy Hash: a4c792ccecd503e8d272473eaa10bfe531a4f554391dbe88db9361097cdb3c02
                                                          • Instruction Fuzzy Hash: 4331DF768043988FDB10DFA8D4957CEBFF0EF49324F19809AC594AB242D3349909CFA5
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,0597EFE9,?,?), ref: 0597F190
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 0ca1dce10a03bd913561814a1e63225b34eba03ba888ad718e8741011cfde5b2
                                                          • Instruction ID: 972d248a5fbb55e2f347ec0912ecdb2091600cb03469060a59483cae87ed4d08
                                                          • Opcode Fuzzy Hash: 0ca1dce10a03bd913561814a1e63225b34eba03ba888ad718e8741011cfde5b2
                                                          • Instruction Fuzzy Hash: D81125B5800349CFDB10DF99C545BEEBBF4EB48320F14845AD959A7240D378A944CFA5
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,0597EFE9,?,?), ref: 0597F190
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 97917fd02978c6b6a1c7a0e5bf9b858a2cda07535cf9c0ffa84647b4e41b89f9
                                                          • Instruction ID: 23297665a078742d981778e28479b0368c6d47f3fe0b295988f665ea1d603f23
                                                          • Opcode Fuzzy Hash: 97917fd02978c6b6a1c7a0e5bf9b858a2cda07535cf9c0ffa84647b4e41b89f9
                                                          • Instruction Fuzzy Hash: 961122B5800349CFDB20DF9AD545BDEBBF4EF48320F24845AE958A7240D738A544CFA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: _
                                                          • API String ID: 0-701932520
                                                          • Opcode ID: c6676cfdcdaf0311839e5cea9135ce92ba7458d85da8265b0faa1f5f6d3761f8
                                                          • Instruction ID: 5f0704e9ae478d75a420870cba2164f21451d8cd1bbb370cc230238a7962157f
                                                          • Opcode Fuzzy Hash: c6676cfdcdaf0311839e5cea9135ce92ba7458d85da8265b0faa1f5f6d3761f8
                                                          • Instruction Fuzzy Hash: 2811E5B091829ACFDF24DF90C891AEEBBF1AF8D204F104028E801B7241DB741F09CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9e67fb34332980b7671e9adc9f2f4aa282f0a0b7485e7ae578c20c1ea72e2895
                                                          • Instruction ID: 8e2226c15652931e910f175f1b95d6c98873650f9da7751190ab90b4063a2410
                                                          • Opcode Fuzzy Hash: 9e67fb34332980b7671e9adc9f2f4aa282f0a0b7485e7ae578c20c1ea72e2895
                                                          • Instruction Fuzzy Hash: 8A726C70B10216CBCB14AFB8D89576EBBB6FF89300F4085A9E449A3350DF39AC85DB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2513bd049bd60a5ddd6903b635e31433ca70150783676f1261b6b6876cd13d69
                                                          • Instruction ID: 4ec950a3bc57f6e3cf87599fad35409c13df2329a7a4a909424973a9023704a2
                                                          • Opcode Fuzzy Hash: 2513bd049bd60a5ddd6903b635e31433ca70150783676f1261b6b6876cd13d69
                                                          • Instruction Fuzzy Hash: 48527C70A14315CBCB48BFB8E8957ADBBB6FF89300F4185A9E448A3251DF385D49CB52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c39dac124068430e45f7f662fd18300d4600bb56faefd3080f15b56f830922c4
                                                          • Instruction ID: 88f94d6305d98408d3583a3f2ce79bcc6bfea17d5cab098f348af5993e6f9061
                                                          • Opcode Fuzzy Hash: c39dac124068430e45f7f662fd18300d4600bb56faefd3080f15b56f830922c4
                                                          • Instruction Fuzzy Hash: 60124D70B20225CBDB08AFB9D89966DBBF6FF89300F408529E445E7350DE3D9C199752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7d0497ea228f7fc1c3564ab2d06dc2113babe0d31eb057b30b1305d5ecca7474
                                                          • Instruction ID: fc3cd3e17686e3b9773844346132726f6544aeac903d7cf4a84a19cbd7d29cdf
                                                          • Opcode Fuzzy Hash: 7d0497ea228f7fc1c3564ab2d06dc2113babe0d31eb057b30b1305d5ecca7474
                                                          • Instruction Fuzzy Hash: F9124C70B20225CBDB08BFB9E89966DBBF6FF89300F408529E445E7350DE399C199752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fdd061d67f21e2f153ddc794582635f06b26e70ef91799b44343ebe7d6e0e684
                                                          • Instruction ID: 5879c789629b2b7ada7bef77830e797ae196124c68f8eafc7624385dd0554f32
                                                          • Opcode Fuzzy Hash: fdd061d67f21e2f153ddc794582635f06b26e70ef91799b44343ebe7d6e0e684
                                                          • Instruction Fuzzy Hash: B7129E71B10216CBCB14AFB8D89576EBBB6FF89300F4084A9E449E3350EE399C95DB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 923bdf89c31b53e41e626d62991fb3acf9e30777caecf38ed90424714412efaf
                                                          • Instruction ID: 37f37df11a90fcfe3d8e366edcaff524ab025ad2f79a2b02213008828673f2db
                                                          • Opcode Fuzzy Hash: 923bdf89c31b53e41e626d62991fb3acf9e30777caecf38ed90424714412efaf
                                                          • Instruction Fuzzy Hash: BCF14070B24225CFC718EFB9D49465E77A6FF8A610B5184ADE406E7360DE3AEC01CB61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 44f4b007e7b407d1a46623e1d4cad370b7bcc108245cf3bb5b01d0a2a8da2e1a
                                                          • Instruction ID: 65a8c7d101331a2d0eb3e047ea64cf0903232634c64887fc222ac73bad555fb0
                                                          • Opcode Fuzzy Hash: 44f4b007e7b407d1a46623e1d4cad370b7bcc108245cf3bb5b01d0a2a8da2e1a
                                                          • Instruction Fuzzy Hash: C6D1F3B1B24204CBCB05FFB8E8952AE7BB6FFC9210F544869E445E7390DE394C1587A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 153cda4f5934426fd52cf1ee2123c79bb95eef0e1abb063711bdbc4a310b0bec
                                                          • Instruction ID: d8bc9398d3ee5c953ed96b6dd7f9c6102f0da939b03251b65e09be8f26660ef5
                                                          • Opcode Fuzzy Hash: 153cda4f5934426fd52cf1ee2123c79bb95eef0e1abb063711bdbc4a310b0bec
                                                          • Instruction Fuzzy Hash: 3EE18EB1B20211CBC704BBB8E89967E7BBAFB89710F444969E845D3350DE3DAC49C791
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c9872f47dd49e354132ddde822d79784ea58034fd5b2a7d90c4eb4505c07e06e
                                                          • Instruction ID: 045de47a9e928d1818c126d65150ecb67743aeda36e2f877f0ae974e182a2f1b
                                                          • Opcode Fuzzy Hash: c9872f47dd49e354132ddde822d79784ea58034fd5b2a7d90c4eb4505c07e06e
                                                          • Instruction Fuzzy Hash: 68A1DD71B20318CBC704BFB9E4A52AD7BB5FF8A310F59446AE481E3290EA3D5C4AC751
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3d8aa5533b7a66f6dbab63c77bc1c3a1450286e1811950adb3ac6076d0b413f4
                                                          • Instruction ID: 748f556ea279925cdce3369baacaddaf52f4784a26ef6e90e6cbdb4c9bedb34b
                                                          • Opcode Fuzzy Hash: 3d8aa5533b7a66f6dbab63c77bc1c3a1450286e1811950adb3ac6076d0b413f4
                                                          • Instruction Fuzzy Hash: 42918B71B20218CBCB04BFB9E4A92AD7BB6FF89710F544829E445E3650EE395C498B51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a32821903ca835ae8f217f9cf2eeae1c7995fb97fcfd9bc9d5bcff24de1b51d7
                                                          • Instruction ID: bfbaabae6a5b8c874432f5f384e0e7b1609fc2fbbdac38a2360f0b1fe34084d3
                                                          • Opcode Fuzzy Hash: a32821903ca835ae8f217f9cf2eeae1c7995fb97fcfd9bc9d5bcff24de1b51d7
                                                          • Instruction Fuzzy Hash: 58A19DB0A04749DFDB29DFA9C8946DEBBF1FF88310F248559E805AB351DB70A941CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc4ba94c69f37ef14a6704b4f78ff34ac760a7fc2910593f387c828e42955647
                                                          • Instruction ID: 64b51e66db0d695886eb532c14b8fbffad128449130eef4485d0b85d17ab880a
                                                          • Opcode Fuzzy Hash: dc4ba94c69f37ef14a6704b4f78ff34ac760a7fc2910593f387c828e42955647
                                                          • Instruction Fuzzy Hash: E7611A71A10709DFDB14DFA9C494A9DBBB2FF88711F108159E909AB361DB70ED81CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c46864101f9c2fc738a02713ffa6a4bd2d3524bab5467aa518b400c82ab9efe3
                                                          • Instruction ID: 2a46811ea1a45584e0ee05b2306f9cef7f747e9e415653a044beda76113fd3ad
                                                          • Opcode Fuzzy Hash: c46864101f9c2fc738a02713ffa6a4bd2d3524bab5467aa518b400c82ab9efe3
                                                          • Instruction Fuzzy Hash: 18611B71A10759CFDB24DFA9C494A9DBBB2FF88711F108159E409AB361DB70ED81CB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6881dac7d955dbdbfd932b6d22a3ddf15ae0ea369442b4c0741d4c0e8ee78c61
                                                          • Instruction ID: f18d42ff0a02190698ab8a4fca5c145c33eb2da4f078cb6e6dc4a4196bbfec1c
                                                          • Opcode Fuzzy Hash: 6881dac7d955dbdbfd932b6d22a3ddf15ae0ea369442b4c0741d4c0e8ee78c61
                                                          • Instruction Fuzzy Hash: 4E51E370A08789CFCB15DFB9D8814EDBFF4EF06210F1085AAE844E7212E7319A16CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c73ad1a8c37acaae49471a8b9e8eed931332abd08e6c3bce852ff6666c2e848f
                                                          • Instruction ID: 4244a5865b00e271b16c106fd7a5888b16be65c550e9e72e8c4d2b0667161800
                                                          • Opcode Fuzzy Hash: c73ad1a8c37acaae49471a8b9e8eed931332abd08e6c3bce852ff6666c2e848f
                                                          • Instruction Fuzzy Hash: D05195B1A04709DBDB28DFA9C8906EDB7B1FF88310F14C62DE94567351EB709A85CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 81ab4dbeb0275e4b2612f8ed77ede74bc56be29b30727d2263750315c9968f84
                                                          • Instruction ID: 3409677f39ac9d30874cb4e2e877ef62bcd4ac2fbfc671fde9efbb2f74c980a1
                                                          • Opcode Fuzzy Hash: 81ab4dbeb0275e4b2612f8ed77ede74bc56be29b30727d2263750315c9968f84
                                                          • Instruction Fuzzy Hash: 9D3146B1D14249CFCF14DFA9D984ADEBBF5BB88210F10852AE805B7350DB786A05CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fbd4d99e572ef1ce2b0ef3261b15441313d7364436dad7681a49ae20bb3857e4
                                                          • Instruction ID: 6be0d254c4d4963c8286fa65879fada34a8e7622bdd00b7d45248db24a7a04fd
                                                          • Opcode Fuzzy Hash: fbd4d99e572ef1ce2b0ef3261b15441313d7364436dad7681a49ae20bb3857e4
                                                          • Instruction Fuzzy Hash: 0631A171E047498FCB15DFA9D8405EEBBF4EF89210F14816AE445F7311EB309A45CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a4f59c078be556af0c5825d479133f4b183cec0b23114ab49fd2562316588d23
                                                          • Instruction ID: 8a901ec39ef7c8b4562dbb55a06c034a305c7f9b1251027187167a066e17c441
                                                          • Opcode Fuzzy Hash: a4f59c078be556af0c5825d479133f4b183cec0b23114ab49fd2562316588d23
                                                          • Instruction Fuzzy Hash: F121C7B6740A119F8725DB69D8848ABB7F6FFC9220711892DF569CB360DB31DC01CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e069d4cfbd1b2ca260537db24daf4117ab24f0a493dca203a29a828f074093f9
                                                          • Instruction ID: 4f244a9ee92212cd291e9100d66d0c4c7eb2ed740b88518590b21e2d4bf0ad51
                                                          • Opcode Fuzzy Hash: e069d4cfbd1b2ca260537db24daf4117ab24f0a493dca203a29a828f074093f9
                                                          • Instruction Fuzzy Hash: C721DE75B043464FCB16DBB988594BFBFB6FBC4250704892AE856C7380EF308D058761
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9aa296883b5178a503493fb277e6b0a6d96d7d03d618d5142f06474861f7f06b
                                                          • Instruction ID: e1ab2002f6d03db74c86815c2171da187173c48ab6ab7fb03e145ed014e0ee2d
                                                          • Opcode Fuzzy Hash: 9aa296883b5178a503493fb277e6b0a6d96d7d03d618d5142f06474861f7f06b
                                                          • Instruction Fuzzy Hash: 8721FBB06183448FDB599F74C85479E7BB2ABC9210F24825DE406DB3C1DF354E06CBA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5a6494c476f5bcd86add73bb6fa00fbef10b7b04e624e49cc01233eb8b5165e3
                                                          • Instruction ID: a94bba8283ed5f8d033510fa8b3f515ba92e3cb6b0396673c1e1b768ea30c4ea
                                                          • Opcode Fuzzy Hash: 5a6494c476f5bcd86add73bb6fa00fbef10b7b04e624e49cc01233eb8b5165e3
                                                          • Instruction Fuzzy Hash: 32218EA164E3C28FD70387749C656A97F75AF43210B0A41E7D495DB2E3D52C4C49C362
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d2c3e33504b88b493184d6a8da6dae1c4caa35ae56e5e3810047c1ad6d5ac529
                                                          • Instruction ID: 1bbfafcb38f17dcb2b508afca13ebd3c503110ca2d942d9cec6cfcf4f4a4e33d
                                                          • Opcode Fuzzy Hash: d2c3e33504b88b493184d6a8da6dae1c4caa35ae56e5e3810047c1ad6d5ac529
                                                          • Instruction Fuzzy Hash: 5D21C8B55002159FD735CF5AC884BEA7FE9FF89270F148165F414DB291D7708A05C7A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1c76668410a263254b4b82e872723db7443edbda756d5a6a06312ce0b2a2e75c
                                                          • Instruction ID: 8c232a7d74886b90b5ad3d7e6276b5e2805b95eca907cbe25933a642e526d754
                                                          • Opcode Fuzzy Hash: 1c76668410a263254b4b82e872723db7443edbda756d5a6a06312ce0b2a2e75c
                                                          • Instruction Fuzzy Hash: 7031F1B5D01218DFDB20DFA9D9857CEBBB4FB08714F24842AE408BB240C3755949CF65
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171831347.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_161d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f64873af7de0d1a74f56b72395265440b30ac59cd6c53b72ed28e8addef6025
                                                          • Instruction ID: 8e512c53af434c8610193b67e73c3d01776c831e70dbabbeb7de5fdbd78d9f28
                                                          • Opcode Fuzzy Hash: 9f64873af7de0d1a74f56b72395265440b30ac59cd6c53b72ed28e8addef6025
                                                          • Instruction Fuzzy Hash: 06214975540304DFDB05DF98D9C8B16BB61FB84314F28C56DE9094B38AC376E847CA61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171831347.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_161d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ef6c517effb09dba1900e125e07f9f50a2bfbce05ec359426ab7f3e9cb636375
                                                          • Instruction ID: 49d5719929cc00ed86c9f5f43d56d021834aadae770a775ff7c642fa632c596d
                                                          • Opcode Fuzzy Hash: ef6c517effb09dba1900e125e07f9f50a2bfbce05ec359426ab7f3e9cb636375
                                                          • Instruction Fuzzy Hash: 20212275604204EFDB15DF58D988B16BB61FB88315F28C5ADE90A0B38AC33AD447CA61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4b089d74324a7c08c06ec6e69efed94e3b42246fbea0b78f7ffb55c666c31b71
                                                          • Instruction ID: 67a0ebc851ae0e793733300e6fdb1b72b2462fff8e97e16a1cd2ee3d69fd7395
                                                          • Opcode Fuzzy Hash: 4b089d74324a7c08c06ec6e69efed94e3b42246fbea0b78f7ffb55c666c31b71
                                                          • Instruction Fuzzy Hash: 143103B0C05258DFDB24CF9AC988BDEBBF5EB48710F24801AE404BB241C7B4A945CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ebbc1ef87aab4d5ab2e1b0412e7db3df51551e73eb055fe6736a9b689c4adcb5
                                                          • Instruction ID: d4369251c1237ac73cfa60c04ca963a04e3baee217cd4cdd375cb0c8248e0765
                                                          • Opcode Fuzzy Hash: ebbc1ef87aab4d5ab2e1b0412e7db3df51551e73eb055fe6736a9b689c4adcb5
                                                          • Instruction Fuzzy Hash: 452151B1C00209DFDB20CF9AC4847DEBFF9FB48324F248529E414AB290C3744A89CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 957d6820396c2d553f1bf018a8aecffc9af461db9961cb7d65ceb8ad89e48ac6
                                                          • Instruction ID: bc5d38ab931a4aef26789b40ff06a0fef0e50a11b72da94c4ff4c2c4b9a39cf7
                                                          • Opcode Fuzzy Hash: 957d6820396c2d553f1bf018a8aecffc9af461db9961cb7d65ceb8ad89e48ac6
                                                          • Instruction Fuzzy Hash: BD21D2B0C01218DFDB20DF99C984BCEBBF8BB48714F64841AE404BB240C7B55945CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171831347.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_161d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f1a1468d280c4400303a9f0cd67df0cf5cd9c63c2c576e277acc2765b1bff937
                                                          • Instruction ID: d9dc33404e7d6c57cf9c97863cf8d458671c97429fe08052daaeec18d499f627
                                                          • Opcode Fuzzy Hash: f1a1468d280c4400303a9f0cd67df0cf5cd9c63c2c576e277acc2765b1bff937
                                                          • Instruction Fuzzy Hash: B721AE755093808FCB03CF64D994B15BF71EB46214F29C5EAD8498F6A7C33A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 308f413aa91984e3b8e80ed1549fd8c0952b3336a3c12a53cde70813c4ec16e2
                                                          • Instruction ID: 3106837d422dc18e876a61bef596043b374a46231195428d2f660f4fd020ef8b
                                                          • Opcode Fuzzy Hash: 308f413aa91984e3b8e80ed1549fd8c0952b3336a3c12a53cde70813c4ec16e2
                                                          • Instruction Fuzzy Hash: 8811CEB67042046FC3148A8EEC95B96BBEDEFD9621F15806AF549CB3A1DA70DC01C6A4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 55288691bedcffa93f2f3d76ffc1f12b4a16105543d41a91d5a3275fda644156
                                                          • Instruction ID: b4c4ec76062add8003e1bcbfb943da67e822ae3c6cd22e3a9ea4f70b434f1574
                                                          • Opcode Fuzzy Hash: 55288691bedcffa93f2f3d76ffc1f12b4a16105543d41a91d5a3275fda644156
                                                          • Instruction Fuzzy Hash: CA1173B6B002165BCB15DB799C855BFBBB6FBC8260B544929E469D7340EF308D068760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 25054c03c430b0e00c93d2ec38fc19b371407af89f7e8141cf4291e2bb6477c2
                                                          • Instruction ID: 0b19ab3d6f0fdc804ea77044feada46455af0c7234ce40985e46f963da071418
                                                          • Opcode Fuzzy Hash: 25054c03c430b0e00c93d2ec38fc19b371407af89f7e8141cf4291e2bb6477c2
                                                          • Instruction Fuzzy Hash: 3B111F71B0020ACBCB69EFB998505EEB7B6AF89710F104079D504E7250EB328E01CBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 01716827308b51e5cb15558b81726f29e7197146a273a9bc57f936ada970e5b6
                                                          • Instruction ID: 13aa70ec7dc2e5888c442fac57bea973cd3e1c15e762a7c3d8cefd5791c81ea6
                                                          • Opcode Fuzzy Hash: 01716827308b51e5cb15558b81726f29e7197146a273a9bc57f936ada970e5b6
                                                          • Instruction Fuzzy Hash: 7B11B875D00A0A8ECB10DFA9D8805DEFBB4EF48310F10966AE559B3211E730A695CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171831347.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_161d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction ID: 876c2777f7c382199ac1663e75be7acc5447ccb2700d645a7ff4f42b03bfac01
                                                          • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction Fuzzy Hash: 1E11BE75544244DFCB02CF58D9C4B55BB71FB84218F28C6A9D8494B757C33AE44ACB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe35e5fedb75b0f823edb8f06669914157e4466a61d536dc99b4fc649e66c73d
                                                          • Instruction ID: 4c33d82d2e29f324faf57b9b0c1c785d43532a84f4747ca2cc1e222634e80000
                                                          • Opcode Fuzzy Hash: fe35e5fedb75b0f823edb8f06669914157e4466a61d536dc99b4fc649e66c73d
                                                          • Instruction Fuzzy Hash: C0112BB561D785CFE7129774E8587AA7FF8EF46205F0504ABE486C7352DB349804C711
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171793021.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_160d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 227719a1ad9f6dea573c9d2d416fc41752cbbfd75a65d2b778198d99585e8503
                                                          • Instruction ID: fe407dd61b643d328d572455364e80998c66778193910cfd85760d039d4f2207
                                                          • Opcode Fuzzy Hash: 227719a1ad9f6dea573c9d2d416fc41752cbbfd75a65d2b778198d99585e8503
                                                          • Instruction Fuzzy Hash: AA01F2314053449AE7268FD9CD84B67BFA8EF41360F18C61AEE084A2C2D3789801CAB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 339abd9b013a781ca725d8d3850af1138e23966e4bdece3c3a23e57880276392
                                                          • Instruction ID: 9e9f21d88622edd3503b3f0e9c33e0b753ebd453cbb7a310b4ddc7634efe9c1c
                                                          • Opcode Fuzzy Hash: 339abd9b013a781ca725d8d3850af1138e23966e4bdece3c3a23e57880276392
                                                          • Instruction Fuzzy Hash: A5012DF1D00219DEEB35DFA9D8447EEBBB1FF44360F108225E424AA160D7744A85CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7c65d096a3b5fabeb72db70153633016a86eff1e8a1f7d6e6a865122a70f0e19
                                                          • Instruction ID: d66d5788079540c211e6559651cef7c5a62f07acbbfd4f5fdece58259f37e83d
                                                          • Opcode Fuzzy Hash: 7c65d096a3b5fabeb72db70153633016a86eff1e8a1f7d6e6a865122a70f0e19
                                                          • Instruction Fuzzy Hash: A3F0FC313100168FC608B7BDA41493E32DBAFC9A20315406EE006DB3A1CE61DC0253A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fce84b8daf4172bd4e148190a1b137d4e7c9342c7176100e8ae953e62a695957
                                                          • Instruction ID: 5e51066b8998e245a5b7e26a230315598bde3046de755b39542509b5e968d4b8
                                                          • Opcode Fuzzy Hash: fce84b8daf4172bd4e148190a1b137d4e7c9342c7176100e8ae953e62a695957
                                                          • Instruction Fuzzy Hash: 7401EDB0900209DFDB25CF5AC4847DEBFF5FB49360F24C169E818AB2A4C7758A85CB94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4daa0671d9f90ccde77db8c1228ced55db1ffe7f79b2423617d27418d2f5f960
                                                          • Instruction ID: 3a1c1ab439128865f038ca54071da9d599d86a0ff926e98fbc9ac68ef7868fc2
                                                          • Opcode Fuzzy Hash: 4daa0671d9f90ccde77db8c1228ced55db1ffe7f79b2423617d27418d2f5f960
                                                          • Instruction Fuzzy Hash: 6DF0B4B27042046FC3149A9EAC51A57BFEDEFD9510B11446BE584C7351DA709C0186A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171793021.000000000160D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0160D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_160d000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4f762c0707fd9c8143780006f335f89777db8405e6053fb68c76eb61e112d0a9
                                                          • Instruction ID: 41f8d8f1f3a3be58bde75383e0ba2b54c425b6fababc13a542fc6271216b2c5d
                                                          • Opcode Fuzzy Hash: 4f762c0707fd9c8143780006f335f89777db8405e6053fb68c76eb61e112d0a9
                                                          • Instruction Fuzzy Hash: A3F0C271405344AEE7258E49CC84B63FFA8EB40724F18C55AEE0C0B282D3789844CAB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d255f5b71f3b9771facca9da67eb0abf55ab76aef5f4b1d643fb4958f6b32f92
                                                          • Instruction ID: d5f2bbf59137113fe3dfb48632daa9b5df81434b5f703b167529c86f4eb36b8b
                                                          • Opcode Fuzzy Hash: d255f5b71f3b9771facca9da67eb0abf55ab76aef5f4b1d643fb4958f6b32f92
                                                          • Instruction Fuzzy Hash: 4FF0E5363141018FD3069E2DC844E593BE9DFCBA2071900FAE009CB772D939CC068BA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a519ad604f1d92a3811afa1016f7ed32a8d8fcac29cd5950f1f8ed54f5681687
                                                          • Instruction ID: 3c3a03bd578fb06f4d9d9359af8eb4f5778967cc7d5100251284b929b799b6b4
                                                          • Opcode Fuzzy Hash: a519ad604f1d92a3811afa1016f7ed32a8d8fcac29cd5950f1f8ed54f5681687
                                                          • Instruction Fuzzy Hash: A801A8B1800219DFDB35DF6AC8447EEBBF5BF49360F148665E424AA2A0D7744A44CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f9877b2f8645b572b7957a15136de145f6b2bafcc4e12335d85e9e4faedf6267
                                                          • Instruction ID: 8c34d264858125e287bec93385b675f2e79a2c5012dcfb4d2a4feeb920e04790
                                                          • Opcode Fuzzy Hash: f9877b2f8645b572b7957a15136de145f6b2bafcc4e12335d85e9e4faedf6267
                                                          • Instruction Fuzzy Hash: 97E06D767002286F9318DA6EEC84D6BBBEEFBCC670315807AF508C7310D9319C01C6A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ea3f8b13d3319653913918d3e84be233960de9220b1620f5fb248c3db5fe8052
                                                          • Instruction ID: f753ba76732b790fe1aa1f7a9a81e6266e7fb8f9c3abe45dc1b996dc0d128c04
                                                          • Opcode Fuzzy Hash: ea3f8b13d3319653913918d3e84be233960de9220b1620f5fb248c3db5fe8052
                                                          • Instruction Fuzzy Hash: 72E09B317002145FD3049A5EDC40E6BFBEEFFD9620B11807EF504D7351CAB0AC0186A4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 03c980b564ef2feb21417c702d4515c099990ada3796dc2ebe212b0f82d8241c
                                                          • Instruction ID: eb09019c8c1e4d7f44e2913a790eff262fcc29c5fca03c8f7967a647164408a1
                                                          • Opcode Fuzzy Hash: 03c980b564ef2feb21417c702d4515c099990ada3796dc2ebe212b0f82d8241c
                                                          • Instruction Fuzzy Hash: 46E068B62283901BC72D16469812AFA3B388BC7200F08402BF841C7203CA50480287F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 35334007b8286a515861cab74c25e0d92c614ca611c8101d3b76b72d0be732c8
                                                          • Instruction ID: b220571c7b3ceafc3e80730ff72b06b77d69ae5ec8a1668ab5af702160571002
                                                          • Opcode Fuzzy Hash: 35334007b8286a515861cab74c25e0d92c614ca611c8101d3b76b72d0be732c8
                                                          • Instruction Fuzzy Hash: 48E0EC363046146FC3149A4FEC88D46FBEDEFD9675B55807AFA09C7361CA71AC01C6A4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b3adb4a5bb74e10e0cbe4e382c596a391b2170238a6555ef8037c3e1f150d9cf
                                                          • Instruction ID: 253c293ece8a8d55126d30919c613339f19041978bf332d05c0c96281a44aeb3
                                                          • Opcode Fuzzy Hash: b3adb4a5bb74e10e0cbe4e382c596a391b2170238a6555ef8037c3e1f150d9cf
                                                          • Instruction Fuzzy Hash: 96E0EC353105148FC744DB2ED448C1977EAEFCEA2531540BAE509CB331DE72DC018B90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fc0f64b09dc167510d92a9f08f4cffd9b0a8fbc251488521128086ba4468f9b
                                                          • Instruction ID: db77cbda0d7735dbcf39d70d74a25fb72b2c79d3835e3baa4a5c14802135cc48
                                                          • Opcode Fuzzy Hash: 2fc0f64b09dc167510d92a9f08f4cffd9b0a8fbc251488521128086ba4468f9b
                                                          • Instruction Fuzzy Hash: 19E0E2B0522203CFCB596B38E41E1AA3F75FE49206B488A6BF80686750DF399540CB41
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 67ea1ef0373adde43a8b3bcd0cbc6c6d39fd65b8a3c811ebfaf695c772eb5b16
                                                          • Instruction ID: e6bea1abcbc8affc618547664a5870caa694427435bdb9bc255721ea6e697852
                                                          • Opcode Fuzzy Hash: 67ea1ef0373adde43a8b3bcd0cbc6c6d39fd65b8a3c811ebfaf695c772eb5b16
                                                          • Instruction Fuzzy Hash: 4FD0127091510BEF8B04EFB4D94556DBBB9EF45304F10859EE805D7300DA312E009BD1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 703e22d84ec8d394070e83ffce9493690af2e2144b8feaae209cbe27d58b8b8a
                                                          • Instruction ID: cfb2bb399adb9553c8d4172e31b2d17a2e4c0fdfb0a9dfdbf8bb13520bd14471
                                                          • Opcode Fuzzy Hash: 703e22d84ec8d394070e83ffce9493690af2e2144b8feaae209cbe27d58b8b8a
                                                          • Instruction Fuzzy Hash: 73E0E2B0222307CB9764BB79E44D6793FA8FB08B06B18456AF80282290CF35E810CA61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 654e0d400dcdcac6f6e6a01aceeb8fad39298be1ad3b1e445c5c1760fde85b34
                                                          • Instruction ID: 642f6ae2c7415839fd0d6a3a4d782b81c81e363e024bbfae7676da137e0e9cca
                                                          • Opcode Fuzzy Hash: 654e0d400dcdcac6f6e6a01aceeb8fad39298be1ad3b1e445c5c1760fde85b34
                                                          • Instruction Fuzzy Hash: E6C04CBE104202AECB41EB50C949B86BEB3AB65644F8485B5514446224DB27C6149711
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @$@$@
                                                          • API String ID: 0-1615930675
                                                          • Opcode ID: 5460b8489e108d83f035675771fcf84abe3f6d090a43fa6257aaf4d4723f1404
                                                          • Instruction ID: 5f604a3e96493ad168fdc58f7f82eba040cece2edad847a2e437ecf368add2af
                                                          • Opcode Fuzzy Hash: 5460b8489e108d83f035675771fcf84abe3f6d090a43fa6257aaf4d4723f1404
                                                          • Instruction Fuzzy Hash: E06108B0D012099FCB14CFAAD5816EEFBB2BF88304F148459E555E7344D738AA41CF95
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @$@$@
                                                          • API String ID: 0-1615930675
                                                          • Opcode ID: 36ec680b5f59c1c23d313035d90e97c8491cc6d623d59e20f255296314c926bd
                                                          • Instruction ID: 20d4147dbaf1bb5a9d4c8ba04ccefd0f640244f383934283777b0dab64165074
                                                          • Opcode Fuzzy Hash: 36ec680b5f59c1c23d313035d90e97c8491cc6d623d59e20f255296314c926bd
                                                          • Instruction Fuzzy Hash: 7B5128B1E052099FCB04CFA9D5816EEFBB2BF85304F14846AE455E7344D738AA41CF90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #HBF$#HBF
                                                          • API String ID: 0-136798975
                                                          • Opcode ID: 36c72a58bb72baad54edf7ccfc9d398968318c30ad6af4c9b9b83a83963c60b0
                                                          • Instruction ID: afa4cfdf3b8f0253a0db7aa4df137582cc82e8acff36f6d214cac574e2db9bd4
                                                          • Opcode Fuzzy Hash: 36c72a58bb72baad54edf7ccfc9d398968318c30ad6af4c9b9b83a83963c60b0
                                                          • Instruction Fuzzy Hash: A361E174E05209CBCB08CFAAD5859EEFBF2FF88314F24942AD419F7264D7349A418B64
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #HBF$w*S
                                                          • API String ID: 0-2996935253
                                                          • Opcode ID: 25459408d21babe50dd90f7169465d25853d069e270e55c7b68df6a12bf7ae00
                                                          • Instruction ID: b07e4e08902c9ba280a962aa87ccda3f39e3ccc8b88f601e65c63297c77d9a2e
                                                          • Opcode Fuzzy Hash: 25459408d21babe50dd90f7169465d25853d069e270e55c7b68df6a12bf7ae00
                                                          • Instruction Fuzzy Hash: AC61E474E052098FCB08CFAAC5855DEFBF2EF89314F28946AD415F7364D7349A418B64
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: A{]z$}\%G
                                                          • API String ID: 0-4271377017
                                                          • Opcode ID: 3d1a9bd6ac9b73328405627f87e22ed451c8e65066d645812b3513d8453034c8
                                                          • Instruction ID: 750d4087f1b58bb556e383b75ac8ee49e2a160bd2abdff57194ce83be01bbb51
                                                          • Opcode Fuzzy Hash: 3d1a9bd6ac9b73328405627f87e22ed451c8e65066d645812b3513d8453034c8
                                                          • Instruction Fuzzy Hash: 7941E9B0D0420ADFDB08CFAAC4855AEFBF2AF89314F24D42AC515F7254E7359A818F94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: A{]z$}\%G
                                                          • API String ID: 0-4271377017
                                                          • Opcode ID: b0e6c9c33084f39467d88a0f1ee7964df4ecc294e99c0ba53c19b94fcd99dfb4
                                                          • Instruction ID: 99979764677bbca138732fa2bf8269581a3402df4e918f2db581f9d960ad7ae8
                                                          • Opcode Fuzzy Hash: b0e6c9c33084f39467d88a0f1ee7964df4ecc294e99c0ba53c19b94fcd99dfb4
                                                          • Instruction Fuzzy Hash: 6D411EB0D0424A9FDB08CFAAC5845AEFFF2AF89314F24D46AC415E7254E7359A42CF94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: F
                                                          • API String ID: 0-2945319695
                                                          • Opcode ID: 37b30d09b5268361916273a361afd18c67fdab86ff9fdf255bd87363b753e774
                                                          • Instruction ID: e483960cfed2b1d892197ea8674ae7a829889138273208ff147389199c2f7a72
                                                          • Opcode Fuzzy Hash: 37b30d09b5268361916273a361afd18c67fdab86ff9fdf255bd87363b753e774
                                                          • Instruction Fuzzy Hash: 6162CD70F14315CFCB05EBB8D85465EBBB6FF8A200F4185AAE449EB250EE399C45CB61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Y|?
                                                          • API String ID: 0-2910633852
                                                          • Opcode ID: 723321aa71afebf324b9b3cc282f98406bd6b5ee9b6c93c1995b2fefb9d3d2cc
                                                          • Instruction ID: 848953cf584e0dec3e51bc747473d5f97d895690d74f1f48f491a2d46b06cfd9
                                                          • Opcode Fuzzy Hash: 723321aa71afebf324b9b3cc282f98406bd6b5ee9b6c93c1995b2fefb9d3d2cc
                                                          • Instruction Fuzzy Hash: 4A81FBB0E053189BEB68CFAAC950B9DFBF2BF88304F14C1AAD509A7355DB305A458F51
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: yS^Z
                                                          • API String ID: 0-4128205011
                                                          • Opcode ID: 95fbbd11a1e33e9b97d3bd063570ea9387f7d91e254535a9fef840f5a8743435
                                                          • Instruction ID: da01d068a00a86be81aa14559d52c15a69a9fe1fef7b1b695a5a5cedf983bbf7
                                                          • Opcode Fuzzy Hash: 95fbbd11a1e33e9b97d3bd063570ea9387f7d91e254535a9fef840f5a8743435
                                                          • Instruction Fuzzy Hash: 1071D2B4D0420A9FCB44CFAAC5809AEFBB2FF49314F14851AE415EB214C730AA82CF95
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: yS^Z
                                                          • API String ID: 0-4128205011
                                                          • Opcode ID: 280094f91db07328a77c3f1a2f7e558733347c0e440590ead146f8f619d2aebd
                                                          • Instruction ID: 91e4ca3d1155ebdc52a36705d4527f1eab2367fb9841f8ef5b65c9892c09f1fc
                                                          • Opcode Fuzzy Hash: 280094f91db07328a77c3f1a2f7e558733347c0e440590ead146f8f619d2aebd
                                                          • Instruction Fuzzy Hash: A461D1B4E0420A8FCB44CFA9C5819AEFFB2BF49314F14855AE415EB315D734AA82CF95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6bd7a93914a52558b361f5384596d6950f0de9741f3bb899572d39e5ad677149
                                                          • Instruction ID: 0ff4ac66d810ee7b50efd009270bf5446b4824ecd4cab7ec1d019af8bfc9f00f
                                                          • Opcode Fuzzy Hash: 6bd7a93914a52558b361f5384596d6950f0de9741f3bb899572d39e5ad677149
                                                          • Instruction Fuzzy Hash: 4F327B70F20215CFCB08EFB9D854A9EBBF6FF89300F5185A9E449A7250EE399845CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b1b30b8c1c6bc7663265f210cc9ec4f97e44ffc6d2bc9edda5f978cd3715c346
                                                          • Instruction ID: 32bba651090bba5def1d1a0e4e1d15548c302da769256782e2509291a6318281
                                                          • Opcode Fuzzy Hash: b1b30b8c1c6bc7663265f210cc9ec4f97e44ffc6d2bc9edda5f978cd3715c346
                                                          • Instruction Fuzzy Hash: D51272B24117468AE730CF65E98C1997BB1BB85338F90C709D2612B2E9DBF9158BCF44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3171681519.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_12a0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8ca1d531ad307422da6c4c5e231e7d163e2529af225899d02097540f3d248f6e
                                                          • Instruction ID: bf4d459cac7c0f041689a3a40d3fbc018ad1fcedb1031af9d100884a06b40b2f
                                                          • Opcode Fuzzy Hash: 8ca1d531ad307422da6c4c5e231e7d163e2529af225899d02097540f3d248f6e
                                                          • Instruction Fuzzy Hash: 83D1D334A10605CFDB18DF69D598AA9BBF1BF8D701F6580A8E605AB361DB31AD40CF60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 16de88cae51724a5c6168e9a7ecac9ebad758888cc3f7fe5a0d009f1a6973ff9
                                                          • Instruction ID: f18ff44b3222ea033d54e86cce84a4559cbf267a809695062779e496f768769d
                                                          • Opcode Fuzzy Hash: 16de88cae51724a5c6168e9a7ecac9ebad758888cc3f7fe5a0d009f1a6973ff9
                                                          • Instruction Fuzzy Hash: 42D11631C2075ACACB01EB64D8916AEB7B5FF99300F50D79AE44A77610EB706AC4CF90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172043774.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1690000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d7d5b9497ed282c0326cd2a930fa79bc7bfbd17223ee654c49548c86a468b440
                                                          • Instruction ID: c9638bd120b969fa561dceb2c0a5b85d724a86476a5e95a98b43d0be2675cdb4
                                                          • Opcode Fuzzy Hash: d7d5b9497ed282c0326cd2a930fa79bc7bfbd17223ee654c49548c86a468b440
                                                          • Instruction Fuzzy Hash: E6A17236E00205CFCF15DFB8C8405AEBBB7FF85300B1585AAE906AB255DB71E956CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 80e0803c6efc6085b87395e4986b022dde3797545601758b309949667840ee9f
                                                          • Instruction ID: 9d0f52b4da3e0e799be5bc12b3c453553b49a905c175485d58d89ae882ef7854
                                                          • Opcode Fuzzy Hash: 80e0803c6efc6085b87395e4986b022dde3797545601758b309949667840ee9f
                                                          • Instruction Fuzzy Hash: D6B1F474E16319CBDF08CFA5D9846ADFBB2FB89314F24952AD40AFB254D7349A018F18
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3177322802.0000000007CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CB0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7cb0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4ac106c51a74ff10110f7dfe397609c748181ddfe5bdb7b5f4c614d0bfb68e75
                                                          • Instruction ID: ecbf7dab9c4c7c010c8f6df4b1655bc7a75cc196d5e4e85c2d8a41a954772ab1
                                                          • Opcode Fuzzy Hash: 4ac106c51a74ff10110f7dfe397609c748181ddfe5bdb7b5f4c614d0bfb68e75
                                                          • Instruction Fuzzy Hash: F2D1F631C2075ACACB01EB64D8916AEB7B5FF99300F50D79AE54A77610EB706AC4CF90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3175035413.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5970000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 680979df9e5a903131f32fc1407363edc08a576c56dd288f4fc209c3904ebfcb
                                                          • Instruction ID: 8d5f2c825f6fd71422cb2a6b4646d7e35c4a45e5b5597d82c29dcc9a65467953
                                                          • Opcode Fuzzy Hash: 680979df9e5a903131f32fc1407363edc08a576c56dd288f4fc209c3904ebfcb
                                                          • Instruction Fuzzy Hash: 10D106B281174A8FD721CF24E8981997BB1BB85334F55831AD1616B2E9DBF8248ACF44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4dce324ccc206f48b7960c3c5f5166c00ab808a679a828284ea889139640598c
                                                          • Instruction ID: e545e627afe3909fcae8a1e9b5de618f19476b30f4298f6fb4882a0998988784
                                                          • Opcode Fuzzy Hash: 4dce324ccc206f48b7960c3c5f5166c00ab808a679a828284ea889139640598c
                                                          • Instruction Fuzzy Hash: FBA12A74E002199BDB18CF69C980AAEFBB6FF89305F24C5A9D418A7355D7309E41CF60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a60629d3048a9156cdea6a24abfc427e0c18517abd019114f6145fb74e8034cd
                                                          • Instruction ID: 923c872ce06a15272d294a89a965e71010b9e463ffbaacb403f43c49af44c8ab
                                                          • Opcode Fuzzy Hash: a60629d3048a9156cdea6a24abfc427e0c18517abd019114f6145fb74e8034cd
                                                          • Instruction Fuzzy Hash: 62811234E15249AFCB45CFA9D48099EBBF2FF89310F1885AAE414EB225D730AE45CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f26338cefaab05e0cc0bceafdf22d24e256e1a9ce29ad0b22d587ff642ffc82f
                                                          • Instruction ID: a3e2e72a6eca37f9afd474cd0f340d313de7cb62a3cae92286865caa06838258
                                                          • Opcode Fuzzy Hash: f26338cefaab05e0cc0bceafdf22d24e256e1a9ce29ad0b22d587ff642ffc82f
                                                          • Instruction Fuzzy Hash: 9D810970E012198FDB14CFAAD580A9EBBB2BF89304F24C1AAD518E7355D7309E41CF61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 72b01b41585e6af0615575a3b66106ea4a1d881ab87231973e123f577f513087
                                                          • Instruction ID: c1de2e819204dc67964610fafb6da3c58cc1f15d30fb410fc1c25316caeb4fdb
                                                          • Opcode Fuzzy Hash: 72b01b41585e6af0615575a3b66106ea4a1d881ab87231973e123f577f513087
                                                          • Instruction Fuzzy Hash: 8771C274E15209AFCB48CFA9D48499EFBF2FB88310F148566E518EB225D730AA41CF51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 28cda0f7dc6e21e00cfff1c2eb9f9ac86b9c03c8f27ffde013f499662dc33b79
                                                          • Instruction ID: cec43405fbc9cd52511b9d4bc91776fa03983e325af84788f1485c022d4ebf3d
                                                          • Opcode Fuzzy Hash: 28cda0f7dc6e21e00cfff1c2eb9f9ac86b9c03c8f27ffde013f499662dc33b79
                                                          • Instruction Fuzzy Hash: 0361D571E05758CBDB28CF6B884169DBBF3AFC9204F18C1BE8448AA265EB340A558F05
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4d0c16d187f7bd3abfce655daf956d7575e3b68449a2e99913a9704933470477
                                                          • Instruction ID: 2bd66007afdd4bd0a707737969fe1c04e159dc6ad0dac4ff8db5d25489301de2
                                                          • Opcode Fuzzy Hash: 4d0c16d187f7bd3abfce655daf956d7575e3b68449a2e99913a9704933470477
                                                          • Instruction Fuzzy Hash: F9514D70E012198BDB14DFAAC9806AEFBF2FF89304F24C16AD518E7205D7305A42CF61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 59609a17e7e7e615c66a30a59a3b851496db41a33c187a200c9b04d11daab322
                                                          • Instruction ID: 408580a1f1aa7892daee99212f3730e9df63ea737cd5eb9d4c66625b0e0be587
                                                          • Opcode Fuzzy Hash: 59609a17e7e7e615c66a30a59a3b851496db41a33c187a200c9b04d11daab322
                                                          • Instruction Fuzzy Hash: D8515B70E012198BDB14CF69C5805AEFBB3FF89304F28C5AAD558A7255DB309E42CF61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 64df3c70a4f94648118aff24155c508857a2e13255d5131e76ced571cc935b45
                                                          • Instruction ID: 7595e1c3878e6a73679c9c195b928119046d2ed9f6c9b108c62f46adafcc7e57
                                                          • Opcode Fuzzy Hash: 64df3c70a4f94648118aff24155c508857a2e13255d5131e76ced571cc935b45
                                                          • Instruction Fuzzy Hash: 3B514871E116188BEB68CF6BC94579EFBF3AFC8300F14C1BA954DA6264DB301A858F51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: da9fabc3c32964107cabb104fd361e7733eeff8f2dbc0d9e065011caa65b1bc2
                                                          • Instruction ID: b80d6de57fb041a039e4df4b99d0183253001a02da896c279dc8503ccdf51a7d
                                                          • Opcode Fuzzy Hash: da9fabc3c32964107cabb104fd361e7733eeff8f2dbc0d9e065011caa65b1bc2
                                                          • Instruction Fuzzy Hash: BD4105B4E0420A9FCB04CFAAC5845AEFBF2AF89310F24C5AAD405F7214E7309A41CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3aaa46f326b791f9da67cc480ef5c43b146cd6abafd02a723fa80b0e13456a3a
                                                          • Instruction ID: 08b00ebb9e909a23fdf6ee3106ff6ad2bc27ddb5ed7fa13110a0bba2b9fa394f
                                                          • Opcode Fuzzy Hash: 3aaa46f326b791f9da67cc480ef5c43b146cd6abafd02a723fa80b0e13456a3a
                                                          • Instruction Fuzzy Hash: 8441C4B4E0520A9BDB44CFAAC5855AEFBF2AF88300F24C56AC519B7214E7349A418F95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3172600323.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_18d0000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e9005dd458c67f0eb37130f0337a3b13caf092be68976295e92076cb643a704b
                                                          • Instruction ID: f151b36dee11bd9d8ff2a8b573562d6befa516fa3046a802b2f6b7322521ab94
                                                          • Opcode Fuzzy Hash: e9005dd458c67f0eb37130f0337a3b13caf092be68976295e92076cb643a704b
                                                          • Instruction Fuzzy Hash: BF21EF71E017588BEB59CF6BD84569EFBF3AFC9300F04C0BAD818A6265EB3406568F51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3174732727.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_5370000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c314025d04f36452865b75250f0e2d219584848f3e56bd6269736b0c6c64d44e
                                                          • Instruction ID: c437b40b885ff59720dae149b0b84ce8bd031629e19c4675a7f24be5383adea7
                                                          • Opcode Fuzzy Hash: c314025d04f36452865b75250f0e2d219584848f3e56bd6269736b0c6c64d44e
                                                          • Instruction Fuzzy Hash: BA21FE71E146488BEB18CF6B9C4069EFBF7AFC9200F14C0BAD858A6265EB3405468F51

                                                          Execution Graph

                                                          Execution Coverage:7.8%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:95
                                                          Total number of Limit Nodes:8
                                                          execution_graph 15059 3436540 15060 3436586 15059->15060 15065 3436720 15060->15065 15068 343670f 15060->15068 15073 3436780 15060->15073 15061 3436673 15080 343611c 15065->15080 15069 3436713 15068->15069 15072 34366b8 15068->15072 15070 343611c DuplicateHandle 15069->15070 15071 343674e 15070->15071 15071->15061 15072->15061 15074 3436783 DuplicateHandle 15073->15074 15077 3436728 15073->15077 15076 343681e 15074->15076 15076->15061 15078 343674e 15077->15078 15079 343611c DuplicateHandle 15077->15079 15078->15061 15079->15078 15081 3436788 DuplicateHandle 15080->15081 15082 343674e 15081->15082 15082->15061 15083 3434668 15084 3434676 15083->15084 15089 3436de0 15084->15089 15087 3434704 15090 3436e05 15089->15090 15098 3436ef0 15090->15098 15102 3436edf 15090->15102 15091 34346e9 15094 343421c 15091->15094 15095 3434227 15094->15095 15110 3438560 15095->15110 15097 3438806 15097->15087 15100 3436f17 15098->15100 15099 3436ff4 15099->15099 15100->15099 15106 3436414 15100->15106 15103 3436f17 15102->15103 15104 3436414 CreateActCtxA 15103->15104 15105 3436ff4 15103->15105 15104->15105 15107 3437370 CreateActCtxA 15106->15107 15109 3437433 15107->15109 15109->15109 15111 343856b 15110->15111 15114 3438580 15111->15114 15113 34388dd 15113->15097 15115 343858b 15114->15115 15118 34385b0 15115->15118 15117 34389ba 15117->15113 15119 34385bb 15118->15119 15122 34385e0 15119->15122 15121 3438aad 15121->15117 15123 34385eb 15122->15123 15125 3439e93 15123->15125 15129 343bed1 15123->15129 15124 3439ed1 15124->15121 15125->15124 15135 343df70 15125->15135 15140 343df60 15125->15140 15130 343beda 15129->15130 15131 343be91 15129->15131 15145 343bf08 15130->15145 15148 343bef8 15130->15148 15131->15125 15132 343bee6 15132->15125 15137 343df91 15135->15137 15136 343dfb5 15136->15124 15137->15136 15156 343e110 15137->15156 15160 343e120 15137->15160 15141 343df91 15140->15141 15142 343dfb5 15141->15142 15143 343e110 3 API calls 15141->15143 15144 343e120 3 API calls 15141->15144 15142->15124 15143->15142 15144->15142 15151 343bff0 15145->15151 15146 343bf17 15146->15132 15149 343bf17 15148->15149 15150 343bff0 GetModuleHandleW 15148->15150 15149->15132 15150->15149 15152 343c034 15151->15152 15153 343c011 15151->15153 15152->15146 15153->15152 15154 343c238 GetModuleHandleW 15153->15154 15155 343c265 15154->15155 15155->15146 15157 343e120 15156->15157 15158 343e166 15157->15158 15164 343c464 15157->15164 15158->15136 15161 343e12d 15160->15161 15162 343c464 3 API calls 15161->15162 15163 343e166 15161->15163 15162->15163 15163->15136 15165 343c46f 15164->15165 15167 343e1d8 15165->15167 15168 343c498 15165->15168 15167->15167 15169 343c4a3 15168->15169 15170 34385e0 3 API calls 15169->15170 15171 343e247 15170->15171 15174 343e256 15171->15174 15175 343e2b0 15171->15175 15179 343e2c0 15171->15179 15174->15167 15176 343e2ee 15175->15176 15177 343e3ba KiUserCallbackDispatcher 15176->15177 15178 343e3bf 15176->15178 15177->15178 15180 343e2ee 15179->15180 15181 343e3ba KiUserCallbackDispatcher 15180->15181 15182 343e3bf 15180->15182 15181->15182

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0343C256
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 9e85ac57776abfe1239c4171d934399aa39a6d9ac9aee5d79984d07f23cca85c
                                                          • Instruction ID: 6669992b3bac00972af290b2171f9004b2fca7d903a8a4352f5c12d5568088b2
                                                          • Opcode Fuzzy Hash: 9e85ac57776abfe1239c4171d934399aa39a6d9ac9aee5d79984d07f23cca85c
                                                          • Instruction Fuzzy Hash: 2B814570A00B458FD724DF6AC48479BBBF1BF89200F048A2ED486EBB50D775E846CB94

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 57 3436780-3436781 58 3436783-343681c DuplicateHandle 57->58 59 3436728-343672b 57->59 65 3436825-3436842 58->65 66 343681e-3436824 58->66 61 3436731-3436733 59->61 62 343672d-343672f 59->62 63 3436735-3436737 61->63 64 3436739-343673b 61->64 62->61 63->64 67 3436741-3436747 64->67 68 343673d-343673f 64->68 66->65 69 343674e-3436774 67->69 70 3436749 call 343611c 67->70 68->67 70->69
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0343674E,?,?,?,?,?), ref: 0343680F
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: b6b9c10d4023a2e82a3f70c946d66b79bfa477a564c34bd06c059141eb0c5fc9
                                                          • Instruction ID: 3490fec7d77c1a5f9f74cad7c8aacb69320883e254eff8aa9cd8d2c3bc952d24
                                                          • Opcode Fuzzy Hash: b6b9c10d4023a2e82a3f70c946d66b79bfa477a564c34bd06c059141eb0c5fc9
                                                          • Instruction Fuzzy Hash: AC3149B5900209EFCF01CFA9E884ADEBFF5EB49310F15801AE914AB310D739A954DFA4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 75 3436414-3437431 CreateActCtxA 78 3437433-3437439 75->78 79 343743a-3437494 75->79 78->79 86 34374a3-34374a7 79->86 87 3437496-3437499 79->87 88 34374a9-34374b5 86->88 89 34374b8 86->89 87->86 88->89 90 34374b9 89->90 90->90
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 03437421
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: 27708722c6439566b1e1c3ef0fbbaeb97b6971c02b43837afa60d6779aa29429
                                                          • Instruction ID: e00b1a5d6898fd5b56463827a7b2f96f4aa743900d00b845acae5c939e85dc6d
                                                          • Opcode Fuzzy Hash: 27708722c6439566b1e1c3ef0fbbaeb97b6971c02b43837afa60d6779aa29429
                                                          • Instruction Fuzzy Hash: EB41EEB0C0071DCBDB24DFA9C844BDEBBB5BF89304F20816AD458AB251DB756946CFA4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 92 3437364-343736b 93 3437370-3437431 CreateActCtxA 92->93 95 3437433-3437439 93->95 96 343743a-3437494 93->96 95->96 103 34374a3-34374a7 96->103 104 3437496-3437499 96->104 105 34374a9-34374b5 103->105 106 34374b8 103->106 104->103 105->106 107 34374b9 106->107 107->107
                                                          APIs
                                                          • CreateActCtxA.KERNEL32(?), ref: 03437421
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: 60cb4d3d0815d6d984655f94226d15ac6232c6ab0b929846716b3f44a1aad8e6
                                                          • Instruction ID: 84c79387e2f9f70af96adfaa4b92d48ba745cd8e43dfab0c64d30f1611059052
                                                          • Opcode Fuzzy Hash: 60cb4d3d0815d6d984655f94226d15ac6232c6ab0b929846716b3f44a1aad8e6
                                                          • Instruction Fuzzy Hash: 6541DFB1C0071DCBDB24CFA9C844B8EFBB5BF89304F24816AD458AB251DB756945CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 109 343611c-343681c DuplicateHandle 111 3436825-3436842 109->111 112 343681e-3436824 109->112 112->111
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0343674E,?,?,?,?,?), ref: 0343680F
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 54ff8916654cff0fe5d7a5fb80be014b3b08c71d8afff3f5ad81cdd1c1745a91
                                                          • Instruction ID: fd1792ef4a34fb9bd6102cd8b271543749815f76f772b59e2e5f0686dbfca7e2
                                                          • Opcode Fuzzy Hash: 54ff8916654cff0fe5d7a5fb80be014b3b08c71d8afff3f5ad81cdd1c1745a91
                                                          • Instruction Fuzzy Hash: BE21E3B5901209EFDB10CFAAD884ADEBBF4EB48310F14841AE918A7350D379A954CFA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 115 343c1f0-343c230 116 343c232-343c235 115->116 117 343c238-343c263 GetModuleHandleW 115->117 116->117 118 343c265-343c26b 117->118 119 343c26c-343c280 117->119 118->119
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0343C256
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3193079451.0000000003430000.00000040.00000800.00020000.00000000.sdmp, Offset: 03430000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_3430000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 4268af1414cd22c94f41828f44a2b683042a81eadaf99d2480bc3bda19b663e1
                                                          • Instruction ID: 23b00d29a85f853ec51169c2bb2cd08e7cb2bda5d793fbba05df0d48174dccc6
                                                          • Opcode Fuzzy Hash: 4268af1414cd22c94f41828f44a2b683042a81eadaf99d2480bc3bda19b663e1
                                                          • Instruction Fuzzy Hash: EA110FB6C042498FDB10DF9AD444ADEFBF4EB89310F14851AD829BB210C379A545CFA5
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3192485143.00000000018DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_18dd000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a6c0f17db98db8bf15f78864fe90f45fbf9db1f6b281f6378f4dd3708cd2b959
                                                          • Instruction ID: 82baf2d1208ecaad64fc01705cda518f1d70218feadf54cb49eb082c67da08c5
                                                          • Opcode Fuzzy Hash: a6c0f17db98db8bf15f78864fe90f45fbf9db1f6b281f6378f4dd3708cd2b959
                                                          • Instruction Fuzzy Hash: EC213471604304DFDB15DF68D9C0B16BB65FBC8314F24C6ADE90A8B286C33AD907CA61
                                                          Memory Dump Source
                                                          • Source File: 00000009.00000002.3192485143.00000000018DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_9_2_18dd000_Pedido09669281099195.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f5795c628db97e75eb9393cb058d7c91f70797471d37bff0dd26fc97a09c8b16
                                                          • Instruction ID: 2b9c08e1405565353b9792ef5316f6c130f1e0b1bab4e07ce5d305a4598f23d4
                                                          • Opcode Fuzzy Hash: f5795c628db97e75eb9393cb058d7c91f70797471d37bff0dd26fc97a09c8b16
                                                          • Instruction Fuzzy Hash: F52192755093848FCB12CF24D990715BF71EB85314F28C6EAD8498B697C33A990ACB62

                                                          Execution Graph

                                                          Execution Coverage:14.5%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:107
                                                          Total number of Limit Nodes:9
                                                          execution_graph 58147 340efc0 58148 340efce 58147->58148 58152 340efed 58147->58152 58149 340efdc 58148->58149 58153 340e52c CloseHandle 58149->58153 58151 340efe9 58153->58151 58172 170d050 DuplicateHandle 58173 170d0e6 58172->58173 58174 154eff0 58175 154f030 ResumeThread 58174->58175 58177 154f061 58175->58177 58206 32fc8e8 58207 32fc930 VirtualProtect 58206->58207 58208 32fc96a 58207->58208 58154 170a678 58158 170a770 58154->58158 58163 170a760 58154->58163 58155 170a687 58159 170a7a4 58158->58159 58160 170a781 58158->58160 58159->58155 58160->58159 58161 170a9a8 GetModuleHandleW 58160->58161 58162 170a9d5 58161->58162 58162->58155 58164 170a7a4 58163->58164 58165 170a781 58163->58165 58164->58155 58165->58164 58166 170a9a8 GetModuleHandleW 58165->58166 58167 170a9d5 58166->58167 58167->58155 58178 1501460 58179 1501486 58178->58179 58180 15015eb 58178->58180 58179->58180 58182 1500b64 58179->58182 58183 15016e0 PostMessageW 58182->58183 58184 150174c 58183->58184 58184->58179 58217 340f130 58218 340f138 CloseHandle 58217->58218 58219 340f19f 58218->58219 58220 170ca00 58221 170ca46 GetCurrentProcess 58220->58221 58223 170ca91 58221->58223 58224 170ca98 GetCurrentThread 58221->58224 58223->58224 58225 170cad5 GetCurrentProcess 58224->58225 58226 170cace 58224->58226 58227 170cb0b 58225->58227 58226->58225 58228 170cb33 GetCurrentThreadId 58227->58228 58229 170cb64 58228->58229 58185 15477e6 58187 1547365 58185->58187 58186 1547731 58187->58186 58190 15497d0 58187->58190 58194 1549cd8 58187->58194 58191 15497de 58190->58191 58192 15497e5 58190->58192 58191->58187 58192->58191 58198 154c060 58192->58198 58196 1549cff 58194->58196 58195 1549dc3 58195->58187 58196->58195 58197 154c060 CreateProcessAsUserW 58196->58197 58197->58196 58199 154c0df CreateProcessAsUserW 58198->58199 58201 154c1e0 58199->58201 58230 154dc20 58231 154dc65 Wow64GetThreadContext 58230->58231 58233 154dcad 58231->58233 58168 154e648 58169 154e690 WriteProcessMemory 58168->58169 58171 154e6e7 58169->58171 58202 154eae8 58203 154eb30 VirtualProtectEx 58202->58203 58205 154eb6e 58203->58205 58209 154ed88 58210 154edcd Wow64SetThreadContext 58209->58210 58212 154ee15 58210->58212 58213 154e308 58214 154e348 VirtualAllocEx 58213->58214 58216 154e385 58214->58216 58234 32fb850 58235 32fb840 58234->58235 58236 32fb8dd 58235->58236 58244 15435ec 58235->58244 58248 1542e02 58235->58248 58252 1543597 58235->58252 58256 1544527 58235->58256 58260 1542aeb 58235->58260 58264 1542c9d 58235->58264 58268 154377d 58235->58268 58272 1544a40 58244->58272 58275 1544a48 58244->58275 58245 154362a 58250 1544a40 VirtualProtect 58248->58250 58251 1544a48 VirtualProtect 58248->58251 58249 1542e13 58250->58249 58251->58249 58254 1544a40 VirtualProtect 58252->58254 58255 1544a48 VirtualProtect 58252->58255 58253 15435ab 58254->58253 58255->58253 58258 1544a40 VirtualProtect 58256->58258 58259 1544a48 VirtualProtect 58256->58259 58257 1544538 58258->58257 58259->58257 58262 1544a40 VirtualProtect 58260->58262 58263 1544a48 VirtualProtect 58260->58263 58261 1542afc 58262->58261 58263->58261 58266 1544a40 VirtualProtect 58264->58266 58267 1544a48 VirtualProtect 58264->58267 58265 1542cc1 58266->58265 58267->58265 58270 1544a40 VirtualProtect 58268->58270 58271 1544a48 VirtualProtect 58268->58271 58269 1543797 58270->58269 58271->58269 58273 1544a90 VirtualProtect 58272->58273 58274 1544aca 58273->58274 58274->58245 58276 1544a90 VirtualProtect 58275->58276 58277 1544aca 58276->58277 58277->58245

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 697 7a4750d-7a47530 698 7a47532-7a4773b 697->698 699 7a474e9-7a47504 697->699 724 7a47742 698->724 725 7a4774a-7a4776f 724->725 728 7a497d5-7a49a83 725->728 729 7a47775-7a48488 725->729 796 7a4a968-7a4b902 728->796 797 7a49a89-7a4a960 728->797 1128 7a4848e-7a48800 729->1128 1129 7a48808-7a497cd 729->1129 1358 7a4bc88-7a4bc9b 796->1358 1359 7a4b908-7a4bc80 796->1359 797->796 1128->1129 1129->728 1363 7a4bca1-7a4c2d5 1358->1363 1364 7a4c2dd-7a4d152 1358->1364 1359->1358 1363->1364 1743 7a4d159-7a4d16f 1364->1743 1747 7a4d16f call 7a4ec10 1743->1747 1748 7a4d16f call 7a4ebec 1743->1748 1749 7a4d16f call 7a4ebdd 1743->1749 1745 7a4d175-7a4d17c 1747->1745 1748->1745 1749->1745
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4934c87b9a6d851d9316160a830ed260a47db899150948b0e9188330e3a0a727
                                                          • Instruction ID: c79542e433f825c85f26be6a937015c70e9abf8302149f1f9030d5412cdd9b91
                                                          • Opcode Fuzzy Hash: 4934c87b9a6d851d9316160a830ed260a47db899150948b0e9188330e3a0a727
                                                          • Instruction Fuzzy Hash: 42B32770B11618CBDB18EF79E9956ACBBB2FB89300F0045EAD449A3750DB369D85CF42

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1750 7a47538-7a4776f 1778 7a497d5-7a49a83 1750->1778 1779 7a47775-7a48488 1750->1779 1846 7a4a968-7a4b902 1778->1846 1847 7a49a89-7a4a960 1778->1847 2178 7a4848e-7a48800 1779->2178 2179 7a48808-7a497cd 1779->2179 2408 7a4bc88-7a4bc9b 1846->2408 2409 7a4b908-7a4bc80 1846->2409 1847->1846 2178->2179 2179->1778 2413 7a4bca1-7a4c2d5 2408->2413 2414 7a4c2dd-7a4d16f 2408->2414 2409->2408 2413->2414 2797 7a4d16f call 7a4ec10 2414->2797 2798 7a4d16f call 7a4ebec 2414->2798 2799 7a4d16f call 7a4ebdd 2414->2799 2795 7a4d175-7a4d17c 2797->2795 2798->2795 2799->2795
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 939184f8391d4ebde1c33b7270df9a3ecc30534052f3321fc34be62f78e635da
                                                          • Instruction ID: 5ac8d2977a3bfc2fbfa9dda2280425554d2bace33b28786325f0cac4637f905f
                                                          • Opcode Fuzzy Hash: 939184f8391d4ebde1c33b7270df9a3ecc30534052f3321fc34be62f78e635da
                                                          • Instruction Fuzzy Hash: 16B32770B11618CBDB18EF79E9956ACBBB2FB89300F0045EAD449A3750DB369D85CF42

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0170CA7E
                                                          • GetCurrentThread.KERNEL32 ref: 0170CABB
                                                          • GetCurrentProcess.KERNEL32 ref: 0170CAF8
                                                          • GetCurrentThreadId.KERNEL32 ref: 0170CB51
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: e8cd25e6546c7c1aedd20ddfbb5b395af4a1214a53853903b07be3cb87643de5
                                                          • Instruction ID: bc283257ec487e6d7fb0294e1d3e56d1c7fa523d3708e8da9e1d8a4716b82342
                                                          • Opcode Fuzzy Hash: e8cd25e6546c7c1aedd20ddfbb5b395af4a1214a53853903b07be3cb87643de5
                                                          • Instruction Fuzzy Hash: F45196B0900309CFDB55DFA9D588B9EBBF1EF88304F24855DD109A72A0D7349A48CF65

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 0170CA7E
                                                          • GetCurrentThread.KERNEL32 ref: 0170CABB
                                                          • GetCurrentProcess.KERNEL32 ref: 0170CAF8
                                                          • GetCurrentThreadId.KERNEL32 ref: 0170CB51
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 330e409cd7976222f319dc50f22a1c7483d135198f2400be6e80aa7ffb0915bd
                                                          • Instruction ID: 78de45c25eb5f05715e9c2315b2820a03d925593ec6ceb2ed61da14690ff8666
                                                          • Opcode Fuzzy Hash: 330e409cd7976222f319dc50f22a1c7483d135198f2400be6e80aa7ffb0915bd
                                                          • Instruction Fuzzy Hash: 295174B090030ACFDB59CFA9D548B9EBBF1EF88304F24815DE109A72A0D7349A48CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3581 170a770-170a77f 3582 170a781-170a78e call 1709ac0 3581->3582 3583 170a7ab-170a7af 3581->3583 3590 170a790 3582->3590 3591 170a7a4 3582->3591 3584 170a7b1-170a7bb 3583->3584 3585 170a7c3-170a804 3583->3585 3584->3585 3592 170a811-170a81f 3585->3592 3593 170a806-170a80e 3585->3593 3639 170a796 call 170a9f8 3590->3639 3640 170a796 call 170aa08 3590->3640 3591->3583 3594 170a821-170a826 3592->3594 3595 170a843-170a845 3592->3595 3593->3592 3598 170a831 3594->3598 3599 170a828-170a82f call 1709acc 3594->3599 3597 170a848-170a84f 3595->3597 3596 170a79c-170a79e 3596->3591 3600 170a8e0-170a8ed 3596->3600 3601 170a851-170a859 3597->3601 3602 170a85c-170a863 3597->3602 3604 170a833-170a841 3598->3604 3599->3604 3611 170a8f4-170a958 3600->3611 3601->3602 3605 170a870-170a879 call 1709adc 3602->3605 3606 170a865-170a86d 3602->3606 3604->3597 3612 170a886-170a88b 3605->3612 3613 170a87b-170a883 3605->3613 3606->3605 3631 170a95a-170a9a0 3611->3631 3614 170a8a9-170a8ad 3612->3614 3615 170a88d-170a894 3612->3615 3613->3612 3637 170a8b0 call 170ad08 3614->3637 3638 170a8b0 call 170acf8 3614->3638 3615->3614 3617 170a896-170a8a6 call 1709aec call 1709afc 3615->3617 3617->3614 3618 170a8b3-170a8b6 3621 170a8b8-170a8d6 3618->3621 3622 170a8d9-170a8df 3618->3622 3621->3622 3632 170a9a2-170a9a5 3631->3632 3633 170a9a8-170a9d3 GetModuleHandleW 3631->3633 3632->3633 3634 170a9d5-170a9db 3633->3634 3635 170a9dc-170a9f0 3633->3635 3634->3635 3637->3618 3638->3618 3639->3596 3640->3596
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0170A9C6
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: f31dba328a7134053e7420fe454eb9ae5144cefadfe8cce50113199db569d9cd
                                                          • Instruction ID: fb626aa9b71da69c160ba3781001b096531000b33874e7c0f768e55408d22abc
                                                          • Opcode Fuzzy Hash: f31dba328a7134053e7420fe454eb9ae5144cefadfe8cce50113199db569d9cd
                                                          • Instruction Fuzzy Hash: 14814570A00B05CFEB26DF29D44475ABBF1FF88210F108A2ED58ADBA90D775E945CB90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3641 154c060-154c0eb 3643 154c0f6-154c0fd 3641->3643 3644 154c0ed-154c0f3 3641->3644 3645 154c0ff-154c105 3643->3645 3646 154c108-154c120 3643->3646 3644->3643 3645->3646 3647 154c131-154c1de CreateProcessAsUserW 3646->3647 3648 154c122-154c12e 3646->3648 3650 154c1e7-154c266 3647->3650 3651 154c1e0-154c1e6 3647->3651 3648->3647 3658 154c278-154c27f 3650->3658 3659 154c268-154c26e 3650->3659 3651->3650 3660 154c296 3658->3660 3661 154c281-154c290 3658->3661 3659->3658 3661->3660
                                                          APIs
                                                          • CreateProcessAsUserW.KERNELBASE(?,?,?,0000000A,?,?,?,?,?,?,?), ref: 0154C1CB
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: CreateProcessUser
                                                          • String ID:
                                                          • API String ID: 2217836671-0
                                                          • Opcode ID: 4963e8af1d3c9a6c768694d330e93b1a267a43ec319a3b78967eaf6541776847
                                                          • Instruction ID: 0afa64e4325f3a0df3723644840110dab0711e5f46d12d5b96fa5d5a01ee24db
                                                          • Opcode Fuzzy Hash: 4963e8af1d3c9a6c768694d330e93b1a267a43ec319a3b78967eaf6541776847
                                                          • Instruction Fuzzy Hash: 2651F771D00229DFDB24CF99C840BDDBBB5BF88314F0485AAE908B7250DB719A89CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3663 32fc8b2-32fc968 VirtualProtect 3665 32fc96a-32fc970 3663->3665 3666 32fc971-32fc992 3663->3666 3665->3666
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 032FC95B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4155483701.00000000032F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_32f0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 1175cf269c558d13d1197bef343823cd4cd24b921a1c5cc8ebeefb78299ec000
                                                          • Instruction ID: d35b02e593901b7d99722c3ea897b1ea67ebef02c7dbe44749231e08b0f69b72
                                                          • Opcode Fuzzy Hash: 1175cf269c558d13d1197bef343823cd4cd24b921a1c5cc8ebeefb78299ec000
                                                          • Instruction Fuzzy Hash: C531767580435ACFCB10CFA9C885ADEFBF0BF49310F14846AD958A7251D339AA55CFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3668 154e648-154e696 3670 154e6a6-154e6e5 WriteProcessMemory 3668->3670 3671 154e698-154e6a4 3668->3671 3673 154e6e7-154e6ed 3670->3673 3674 154e6ee-154e71e 3670->3674 3671->3670 3673->3674
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0154E6D8
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 2b0de7daa7e4bc9dacb99f446519ba202321450ee2a4a9919c98b65bb755b17c
                                                          • Instruction ID: ff4a210b231ec1e3010b22ea92ad5d9964ec77faab65978f0973984a6fba647d
                                                          • Opcode Fuzzy Hash: 2b0de7daa7e4bc9dacb99f446519ba202321450ee2a4a9919c98b65bb755b17c
                                                          • Instruction Fuzzy Hash: B6212571900349DFDB10DFA9D885BDEBBF5FF88314F10882AE919A7240D7799944CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3678 170d049-170d04e 3679 170d050-170d0e4 DuplicateHandle 3678->3679 3680 170d0e6-170d0ec 3679->3680 3681 170d0ed-170d10a 3679->3681 3680->3681
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170D0D7
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 87f8bd06ea903bd887f6ef8536b1a6341442ef40a28d6830ffc0034b7f340f1b
                                                          • Instruction ID: c1a4ee9262b25e9f0ffdb43a97510cd2be966e8a35cf3bbf7b2218a31a2b0e3c
                                                          • Opcode Fuzzy Hash: 87f8bd06ea903bd887f6ef8536b1a6341442ef40a28d6830ffc0034b7f340f1b
                                                          • Instruction Fuzzy Hash: 1221D4B5900349DFDB10CFAAD484ADEFBF4EB48314F14841AE919A7250D375A944CF61
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0154EE06
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: e6e0e59dbcfd2ea5910a692080a2a01491831d7d0efb459eff5dc6712ac84e9d
                                                          • Instruction ID: b26c51d23642a3f57a658028f5827590405a4bc96d5fa8770f12ffc7a1b6c344
                                                          • Opcode Fuzzy Hash: e6e0e59dbcfd2ea5910a692080a2a01491831d7d0efb459eff5dc6712ac84e9d
                                                          • Instruction Fuzzy Hash: 48213871D003098FDB14DFAEC8857AEBBF4FF48214F54842AD519AB240D7789945CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3684 154dc20-154dc6b 3686 154dc6d-154dc79 3684->3686 3687 154dc7b-154dcab Wow64GetThreadContext 3684->3687 3686->3687 3689 154dcb4-154dce4 3687->3689 3690 154dcad-154dcb3 3687->3690 3690->3689
                                                          APIs
                                                          • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0154DC9E
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 19c5f5476c46faa3026d10448bf7ba5b08e243d557bb62d99c6b482ce7467832
                                                          • Instruction ID: a5175329bd468b66f107cebbb0146ce28e8d7b83f3516a9d65c1816d7d131680
                                                          • Opcode Fuzzy Hash: 19c5f5476c46faa3026d10448bf7ba5b08e243d557bb62d99c6b482ce7467832
                                                          • Instruction Fuzzy Hash: FF213571D003098FDB10DFAAC4857AEBBF4BF88224F14842AD519AB240DB789945CFA4
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0170D0D7
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: a4f51c64a30845183168f6f9039173a68226192fbf58de3d6e0f6c866949b5b1
                                                          • Instruction ID: 7984acee0d124ceef074a33b490d80c7dc426f9e6c4d2621c2d520cdd0c17193
                                                          • Opcode Fuzzy Hash: a4f51c64a30845183168f6f9039173a68226192fbf58de3d6e0f6c866949b5b1
                                                          • Instruction Fuzzy Hash: 9421E4B5900348DFDB10CFAAD884ADEFBF4EB48310F14841AE918A3350D375A944CFA0
                                                          APIs
                                                          • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 0154EB5F
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 495a311a25a589eead3c6d6644312c86ebe6e1713ca31fc4b4e3555d55def511
                                                          • Instruction ID: 8f6253345ff977df43237030090dc7ca36204819aaeda077a7f2caaf3d187384
                                                          • Opcode Fuzzy Hash: 495a311a25a589eead3c6d6644312c86ebe6e1713ca31fc4b4e3555d55def511
                                                          • Instruction Fuzzy Hash: 38210471C002499FDB10DFAAD885BAEBBF5FF48320F14842AD519A7240D7799945CFA1
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01544ABB
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 3f9f3d82d467383c3e8cfb8e5a87c14e3e26459db9b2d8815afa04b501223897
                                                          • Instruction ID: 073ddcd3a0b49d94e4d5374b93fa985cc01ea9ade409f24ffdede7f7336e4eeb
                                                          • Opcode Fuzzy Hash: 3f9f3d82d467383c3e8cfb8e5a87c14e3e26459db9b2d8815afa04b501223897
                                                          • Instruction Fuzzy Hash: C92136B5800249DFDB10CF9AD484BDEBBF5FB48324F10842AE518B7250D3789945CFA0
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 01544ABB
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: d8d7ab915c2dda4377134b859d1054dc1965579fce47af30f946f5daa1ac9263
                                                          • Instruction ID: 0dacd4f6e86b93f26cc29bc5a5bc00b9d661f4739be6ef300fdf8fc8dfe1bf6c
                                                          • Opcode Fuzzy Hash: d8d7ab915c2dda4377134b859d1054dc1965579fce47af30f946f5daa1ac9263
                                                          • Instruction Fuzzy Hash: 032114B59002499FDB10DF9AD884BDEFBF4FB48324F10842AE958A7250D378A944CFA5
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 032FC95B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4155483701.00000000032F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_32f0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 0a97f6789a181e0c8ef1572bb9fa72705067f0e9d592420bfcfdbd293c4746ed
                                                          • Instruction ID: ddb6482a5f2e6c311e13d989611c1c6dbddf234bb4a85b21a1615520016ce736
                                                          • Opcode Fuzzy Hash: 0a97f6789a181e0c8ef1572bb9fa72705067f0e9d592420bfcfdbd293c4746ed
                                                          • Instruction Fuzzy Hash: AB21D3B59002499FDB10DF9AD984BDEFBF4EB48320F14842AE958A7250D378A944CFA1
                                                          APIs
                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0154E376
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 8b4f03649417454ab40fb9d8ab3896e595dcfb7a49d0d1647d41c17b086fcce7
                                                          • Instruction ID: 82f2e1d1c6197fc8ace163564fee8e562da1ad9492c60c0c8e7f83b0b275aa3a
                                                          • Opcode Fuzzy Hash: 8b4f03649417454ab40fb9d8ab3896e595dcfb7a49d0d1647d41c17b086fcce7
                                                          • Instruction Fuzzy Hash: 6E1156718003499FDB10DFAAD845BDEBBF5FF88320F14881AE519A7250C779A904CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152764979.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1540000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: d46b768d1191bfdcf5c096a17a6f52a55a58c27868c1a96728286f2baf9eb2ce
                                                          • Instruction ID: 2c95813668dc2c923f981b2730169a4cf532346b7d7e283a84c397a5ad7aba39
                                                          • Opcode Fuzzy Hash: d46b768d1191bfdcf5c096a17a6f52a55a58c27868c1a96728286f2baf9eb2ce
                                                          • Instruction Fuzzy Hash: C8112871D00349CFDB24DFAED44579EFBF4AF88624F24881AD519A7240C775A944CBA0
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0150173D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152660998.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1500000_workbook.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: a9b55fc8201778e400e336aae3772db9e23515906d6c1197c52db389c9fdceb8
                                                          • Instruction ID: 8a2e8cd32e051fd0d48d6d2a0608dd829cf1443571e812e463e5435db9f253b7
                                                          • Opcode Fuzzy Hash: a9b55fc8201778e400e336aae3772db9e23515906d6c1197c52db389c9fdceb8
                                                          • Instruction Fuzzy Hash: 1C1103B5800749DFDB10DF9AD885BDEBBF8FB48320F208859E618A7240C375A944CFA5
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0170A9C6
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153323052.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1700000_workbook.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 60e408d7e33e2a382155514e0f41bb83c696159a09cec8c6837eb0bbf47970e5
                                                          • Instruction ID: a5e932e81f5235270c5b656954c8c80de1b21323066234e96edc59ad08dc14a5
                                                          • Opcode Fuzzy Hash: 60e408d7e33e2a382155514e0f41bb83c696159a09cec8c6837eb0bbf47970e5
                                                          • Instruction Fuzzy Hash: 94111DB6D00749CFDB10DFAAD444ADEFBF4AB88220F11842AD968B7640C379A545CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 0150173D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152660998.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_1500000_workbook.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 97e603cd512c7794c561008f01b2ff6bf4541320bb8c8e0a9ef3887717359c7c
                                                          • Instruction ID: afd597e4438e1e61200523e77bfc6f84485924d08e316f51041dfe4abd296d89
                                                          • Opcode Fuzzy Hash: 97e603cd512c7794c561008f01b2ff6bf4541320bb8c8e0a9ef3887717359c7c
                                                          • Instruction Fuzzy Hash: 651103B5800349DFDB50DF99D485BDEBBF4FB48320F20841AE518A7240C375A944CFA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @
                                                          • API String ID: 0-2766056989
                                                          • Opcode ID: f1eaa74f43295ec533701f4476e9f62b4be9911e2578e80a6440df2b461348db
                                                          • Instruction ID: fcef7af61a2d07af8165d7b6964aba78744d12c6d9106752ecd4efd7012e7c6c
                                                          • Opcode Fuzzy Hash: f1eaa74f43295ec533701f4476e9f62b4be9911e2578e80a6440df2b461348db
                                                          • Instruction Fuzzy Hash: CF41779160E3D14FD307977458346997FB1AF87214B1E01DBD196CF6E3D91A8C0A83A7
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,0340EFE9,?,?), ref: 0340F190
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4156064071.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_3400000_workbook.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 6afbbc01a368ca9c597e88a93b0a312db67312877728337ddc2e256dd29f676c
                                                          • Instruction ID: 572d0ef926fb17d0b2e5544407c4596a4a0f195d153d4ee6f49f8aed5d02e9b7
                                                          • Opcode Fuzzy Hash: 6afbbc01a368ca9c597e88a93b0a312db67312877728337ddc2e256dd29f676c
                                                          • Instruction Fuzzy Hash: E51146B1800349DFDB20DF99D445BDEFBF4AB48320F14852AD958A7240D338A948CFA5
                                                          APIs
                                                          • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,0340EFE9,?,?), ref: 0340F190
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4156064071.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_3400000_workbook.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: a76b96cf12a620d5670d3d5d891b704d9f61b145f8d059264223b9772703be57
                                                          • Instruction ID: c3bfb76bf453865d84c7b9c4175f98798685ad167c59655bab218136fab7f372
                                                          • Opcode Fuzzy Hash: a76b96cf12a620d5670d3d5d891b704d9f61b145f8d059264223b9772703be57
                                                          • Instruction Fuzzy Hash: 0F1125B1904349DFDB20DF99D445BEEBBF4EB48320F14842AD558AB340D378A948CFA5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e3ef3f2aa1bdcddc44a14bd592ad7c025248c226f639315765003cb5b799613d
                                                          • Instruction ID: 1de2c2e4e970f9a57edb25a4937113f9766a738740f6ff849227c1a33762c67a
                                                          • Opcode Fuzzy Hash: e3ef3f2aa1bdcddc44a14bd592ad7c025248c226f639315765003cb5b799613d
                                                          • Instruction Fuzzy Hash: 75728E70A10215CFDB14AFB9E89576EBBB2FF89200F4089AAD449E3350DF3A9C45DB51
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a2203624060666785ba449f0f607602efc4dc72e7a9522f1644173c79ae87cf3
                                                          • Instruction ID: 6ab82558bea5fb7496b095aa088e4f07c735d7ab82db7db44e229ee817a2f0e9
                                                          • Opcode Fuzzy Hash: a2203624060666785ba449f0f607602efc4dc72e7a9522f1644173c79ae87cf3
                                                          • Instruction Fuzzy Hash: 2A529E70A14714CBCB44FFB9E89575DBBB6FF89200F4185AAD448A3260DF3A9C49CB52
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bb8e0eb42feb398d029db31b25a8377ac57bc659f115627325db7abd901d09db
                                                          • Instruction ID: 4adda4510b991d13c70911fa1e401488cbfc4c054ed2efbd5f8a72564c21e397
                                                          • Opcode Fuzzy Hash: bb8e0eb42feb398d029db31b25a8377ac57bc659f115627325db7abd901d09db
                                                          • Instruction Fuzzy Hash: C812CE70A10215CFCB14AFB9E85576EBBB2FF89200F4085AAD449E3350EF3A9C55DB91
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3390b6eead6dbc238883eff982a9f5f0ebe6280adaab3bf28d5af3f0fe4249dd
                                                          • Instruction ID: be1b618e3fdc799d7d7d3e61025632c359158894b4f6a42f0e4bd7275da37cea
                                                          • Opcode Fuzzy Hash: 3390b6eead6dbc238883eff982a9f5f0ebe6280adaab3bf28d5af3f0fe4249dd
                                                          • Instruction Fuzzy Hash: 5A123B70F10215DBDB04AFB9E89969DBBF6FB8A200F50892AD445E7350DF3AAC05C751
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5f2551f18b61613786195d718e35aa1760b5e1928887a26a759f2b431d0010d0
                                                          • Instruction ID: d6771867ffa19ffcae9ba5fce47f7261d62caaa13a4580340f30342795583bc8
                                                          • Opcode Fuzzy Hash: 5f2551f18b61613786195d718e35aa1760b5e1928887a26a759f2b431d0010d0
                                                          • Instruction Fuzzy Hash: 11124B70F10215CBDB04BFB9E89969DBBF6FB8A200F508929D445E7350DE3AAC05CB52
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 09f30f2c4d6e328f381cad6f50a72d81459e5b11b9b50575451688cc10a39eea
                                                          • Instruction ID: 120054dd6441ec38baaeb5a07e61aac36063678a46c368ae881222c72941cf93
                                                          • Opcode Fuzzy Hash: 09f30f2c4d6e328f381cad6f50a72d81459e5b11b9b50575451688cc10a39eea
                                                          • Instruction Fuzzy Hash: E1F14CB0B10215CFCB44EFB9D89465E77F6FF8A610B5485A9D406DB360DA3AEC01CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6f5c77c2d588ce76e53fa4c4d6002aa7192ad256100e06c85596cf68f64c222d
                                                          • Instruction ID: 04df3689e8ba3555f72340995145958fef42635ea0d424325637e290576213b5
                                                          • Opcode Fuzzy Hash: 6f5c77c2d588ce76e53fa4c4d6002aa7192ad256100e06c85596cf68f64c222d
                                                          • Instruction Fuzzy Hash: 31E18E71B10301CFCB08BBB9E89A66E7BB6FB89600F444969D845E3350DE3EAC45C791
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7ee44eb253977987ff33f7810b9ea972d4b734cc88bb7f9bcbeb3c1debf1f88a
                                                          • Instruction ID: 030bcba04ef12d45d0adc0f6efd0027b9de630f28154b6b5f21e273a7498668b
                                                          • Opcode Fuzzy Hash: 7ee44eb253977987ff33f7810b9ea972d4b734cc88bb7f9bcbeb3c1debf1f88a
                                                          • Instruction Fuzzy Hash: 14D1B170F10204CBDB05FBB9E8952AEBBF6FBC9210F544929D445E7390DE3A9C0587A2
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ccda21ef1504869977f42980fb4450879a255a67e4609636861acb1326249566
                                                          • Instruction ID: 1366b072029e30a9317c43904bfd450ead8d385848c9965d89152736658cd85e
                                                          • Opcode Fuzzy Hash: ccda21ef1504869977f42980fb4450879a255a67e4609636861acb1326249566
                                                          • Instruction Fuzzy Hash: 29A1BF70B10308CBDB49BBB9E89529D7BF1FF86200F45496AD441E3690DA3EAC4AC751
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7fcf5c253a7f2ab83c6796fe1d5d1a088779f28f7b69b6beb77be087c814142d
                                                          • Instruction ID: cb5a6e1c7a9437bd29e6bbd03d10ceaf1c98862ddef4b049f4182b8c878f4d76
                                                          • Opcode Fuzzy Hash: 7fcf5c253a7f2ab83c6796fe1d5d1a088779f28f7b69b6beb77be087c814142d
                                                          • Instruction Fuzzy Hash: 39C11D75E00606CFCB18DF68D491AAEBBB2BFC8320B158259DD556B355DB31EC82CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8c04f252f80a65b64a16c40cf20213596398f42d0fbf240ad65efa233d333df8
                                                          • Instruction ID: 8970ae0e11059de1ea56b47f1ef49e4c05b49881839103b1323c036ffc6d7b9f
                                                          • Opcode Fuzzy Hash: 8c04f252f80a65b64a16c40cf20213596398f42d0fbf240ad65efa233d333df8
                                                          • Instruction Fuzzy Hash: 56916D70F10208CBCB48BFB9E89969D7BF6FF89600F544929E445E3750DE3AAC468B51
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ad7ca4bcd909e1a6c73d1ffe96482802115701b174b0b9b94e01f2810560170c
                                                          • Instruction ID: 49e0dd2f8fb0b42bc7a84eb2da7fb4d1b5e412a3ff09f9433bf762203de0cb52
                                                          • Opcode Fuzzy Hash: ad7ca4bcd909e1a6c73d1ffe96482802115701b174b0b9b94e01f2810560170c
                                                          • Instruction Fuzzy Hash: D2A16BB0A00649DFDB15DFA9C85479EBBF1FFC8310F24862AE415AB390DB71A845CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e94eadd0ac2031a8d6036da8cfcfb26f13a6f3d3e7418849cc99ccb564ae096
                                                          • Instruction ID: 0ffc78922efd20ee407e7e13c2e24c24a2da6dbdaed17b8e47cac30a8058f2a1
                                                          • Opcode Fuzzy Hash: 1e94eadd0ac2031a8d6036da8cfcfb26f13a6f3d3e7418849cc99ccb564ae096
                                                          • Instruction Fuzzy Hash: F5B10A75A00606CFCB14DF98D491AAEBBB2BFC8310B198255DD55AB355DB31FC82CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5818299421c45731b37962bbb9bce745a9297da7fc9f1293184851c036fa51e0
                                                          • Instruction ID: 703edb5294ae4a727bb92053041be07074ec55e54f7967cda9244bd41d8d5170
                                                          • Opcode Fuzzy Hash: 5818299421c45731b37962bbb9bce745a9297da7fc9f1293184851c036fa51e0
                                                          • Instruction Fuzzy Hash: AF611C71A00609DFDB14DFA9C454A9DBBF2FF88710F108159E919AB3A1DB71ED81CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9f91e49a417e280b423c2a68b0ac8a9199fc90c71b9b4c13b2f568293e831f04
                                                          • Instruction ID: 98d383e5024b1417b7e5893e9b4d3b374402616540e6da7e80802737bc1a2bb6
                                                          • Opcode Fuzzy Hash: 9f91e49a417e280b423c2a68b0ac8a9199fc90c71b9b4c13b2f568293e831f04
                                                          • Instruction Fuzzy Hash: 12610671A00619DFDB14DFA9C854B9DBBF2FF88710F118159E819AB3A0DB71AD81CB80
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 953bff25a8282efb52c774061a8afd40ca50d19950689081fcf5f7f52eafa3bf
                                                          • Instruction ID: 14aee517a8cd0f36be6e20056acd7a61f532ae4c8e3163b178ad2f238b95184f
                                                          • Opcode Fuzzy Hash: 953bff25a8282efb52c774061a8afd40ca50d19950689081fcf5f7f52eafa3bf
                                                          • Instruction Fuzzy Hash: 7E41E031B002068FCB15DBB998489BEBBF6FFC82207148569E429DB394EF309C018791
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ce807fd6634a471e1aea9864393e425eb53ba9a805b83d4684acc70b0bf892be
                                                          • Instruction ID: 991858d5e3439015f7f8e59dcad525ea68dd9e699d3d97e36708b5d31f78cdf8
                                                          • Opcode Fuzzy Hash: ce807fd6634a471e1aea9864393e425eb53ba9a805b83d4684acc70b0bf892be
                                                          • Instruction Fuzzy Hash: AD414CB1900709DBDF14DFA9C85469DBBB1FFC8310F14C619E819AB264EB71A981CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 75f3b226c63b42f2aa40d0a19b93316e655c5238dd91da35695da0fdc1d9dd71
                                                          • Instruction ID: 590dd023054afe18a5fd02e18715d17d0dc840fc6ee72125398fea75618d4cd3
                                                          • Opcode Fuzzy Hash: 75f3b226c63b42f2aa40d0a19b93316e655c5238dd91da35695da0fdc1d9dd71
                                                          • Instruction Fuzzy Hash: 9B3144B1D04249DFDB00DFA9D984BAEFBF5BB88300F10842AD815B7350DB799905CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 52d2a74b4045b18bc9100527c024aded481fee818b6a70fc73215ed58b0dfaa3
                                                          • Instruction ID: 5e578b4e377501f5a6d671cb62e7fcb402641075f2ae83a30d7b91f420d15298
                                                          • Opcode Fuzzy Hash: 52d2a74b4045b18bc9100527c024aded481fee818b6a70fc73215ed58b0dfaa3
                                                          • Instruction Fuzzy Hash: 39318D71E0064ACFDB01DFADD8506EEBBF0FF88210B15826AE519F7211EB319941CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 725ed3075e40daec8ef919d3f7962c6240efc90d19df3c6e241b95eda3ecd49b
                                                          • Instruction ID: 882df511f2095084f88f9fde950d36dd9ef783476adcb21681350ef9a7332213
                                                          • Opcode Fuzzy Hash: 725ed3075e40daec8ef919d3f7962c6240efc90d19df3c6e241b95eda3ecd49b
                                                          • Instruction Fuzzy Hash: BD21B3B6B00A129FD725DB6DD88096FB7F6FFC82213118929E569C73A0CB32EC018740
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 284e8513a958fb02e555b7268bc5697f3ba0ee20c2e43b6b30c133494bbf4ebb
                                                          • Instruction ID: 504e0412a646eba7241ad50e0fa351eb583e06275cde11cda6eae8cbd186b8f1
                                                          • Opcode Fuzzy Hash: 284e8513a958fb02e555b7268bc5697f3ba0ee20c2e43b6b30c133494bbf4ebb
                                                          • Instruction Fuzzy Hash: 3E3124B1C00208DFEB10DF99D988BDDBBF4FB88714F24852AE418BB280D3B55845CBA0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ebf869405864cffc0100ef4387f4bec2a730ee90222d7b532f4b2077000864d8
                                                          • Instruction ID: 5ec6c8b5f6da75907d715b8ecd0ab619e461474fbddac8638966fcdfd56b8cc1
                                                          • Opcode Fuzzy Hash: ebf869405864cffc0100ef4387f4bec2a730ee90222d7b532f4b2077000864d8
                                                          • Instruction Fuzzy Hash: 722168A164E3C18FD70397B49C646A97F71AF83210B0A41E7D491DB1E3D6289C0AC362
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153005383.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_158d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d34309145fe919f9d82a726e7caa8ab4aa3d8de62ef6e76df7093f64810f4513
                                                          • Instruction ID: 5e14fc19eeec003b74eed5ebe1a2792fae45baa0387d6ef360dea78f7251fe2a
                                                          • Opcode Fuzzy Hash: d34309145fe919f9d82a726e7caa8ab4aa3d8de62ef6e76df7093f64810f4513
                                                          • Instruction Fuzzy Hash: F0212575604204DFDB15EF98D980B2ABBF1FB84314F24C96DE90A5F282D33AD407CA61
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153005383.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_158d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b760e5040cc287d15e9279b35b9127f66fb08da40c9b97286173bb1daa728d9f
                                                          • Instruction ID: 5f6f2d0e781af4ed1f689bb19e8bc2ad715e54aefdf4e9620be3f05e8e8a3e6d
                                                          • Opcode Fuzzy Hash: b760e5040cc287d15e9279b35b9127f66fb08da40c9b97286173bb1daa728d9f
                                                          • Instruction Fuzzy Hash: 99212571500204DFDB05EF98D5C0B1ABBF1FB84314F24C96DE9095F292C776E846CA61
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c4a2aaa6a3623752228a5643148887bc050a4be702112e2f3acc39ada582816c
                                                          • Instruction ID: c7835e75e914d52720844c89723ca5210b9a1d5b502b3d49660d63c099c29a5d
                                                          • Opcode Fuzzy Hash: c4a2aaa6a3623752228a5643148887bc050a4be702112e2f3acc39ada582816c
                                                          • Instruction Fuzzy Hash: 6E31E2B1C01259EFDB20DF99C589BDEBBF5EB88714F24801AE414BB340C7B69845CBA5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cb8c4a658a07f375608a1f963d96429b221f76f79d4b6b3f0307a1efb49a1303
                                                          • Instruction ID: 3bfa0d033e92490c8ef1ae7a7c36b0295d7e078bc3e8dc692997443c4935ad09
                                                          • Opcode Fuzzy Hash: cb8c4a658a07f375608a1f963d96429b221f76f79d4b6b3f0307a1efb49a1303
                                                          • Instruction Fuzzy Hash: BF21D3B0C01318DFDB20DF99D588B8EBBF4BB88714F64841AE414BB280C7B55845CFA5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6ee8af851fd9c4bb6c1e99096eca06ab4472b60d0316004563dc77c0b099bee2
                                                          • Instruction ID: afd16707f670b07483c2df8b9baf5bf3c7cc800f278898e31e4dde0f016418c4
                                                          • Opcode Fuzzy Hash: 6ee8af851fd9c4bb6c1e99096eca06ab4472b60d0316004563dc77c0b099bee2
                                                          • Instruction Fuzzy Hash: 4F11A1367042046FD3049A5EEC85F56FBEEFFC9A20B15806BF549C7361C970AC01C6A5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153005383.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_158d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 14aa811ab2c9d52d0e966c1fe74539bce3b89da444ec2f731047f5c8afd23cfc
                                                          • Instruction ID: a76f26a4d5659918307130913e3f63216d661014e63a642dba253c4dd0d0f499
                                                          • Opcode Fuzzy Hash: 14aa811ab2c9d52d0e966c1fe74539bce3b89da444ec2f731047f5c8afd23cfc
                                                          • Instruction Fuzzy Hash: 55216A75509384CFDB02DF64D990715BFB1BB46214F29C5EAD8498F2A7C33A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 038001174b27a27d9c84ab7e3bd80979271b57ab9e9fc6e7497e6a8b2eff12d0
                                                          • Instruction ID: 7d46ce6b3db2be749e36e2a9ffe00920e7d61f725465b0524e213adebd2cd84b
                                                          • Opcode Fuzzy Hash: 038001174b27a27d9c84ab7e3bd80979271b57ab9e9fc6e7497e6a8b2eff12d0
                                                          • Instruction Fuzzy Hash: D711A3B5A006165B9B15DBBD9C446BFBBFBFBC82607144929E429E7340EF30C9028761
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c57609bad9a17491b7b192fa726e5791eaba678a410665d16615890386c7d16f
                                                          • Instruction ID: 394029bd9c650fc41e76599860979ebf854ef393aac6a42280f78b0e2ccbee0d
                                                          • Opcode Fuzzy Hash: c57609bad9a17491b7b192fa726e5791eaba678a410665d16615890386c7d16f
                                                          • Instruction Fuzzy Hash: DE112171B0020ACBCB59EBB998146EEB6F6BFC8710F104079D514E7350EB328D01CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4153005383.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_158d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction ID: 1d6fb2fa1e9489b31bc7da9bbad3b9286006921922636a80f9184198e8fbd272
                                                          • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction Fuzzy Hash: 6B11BB75504284CFCB06DF58D5C4B19BBB2FB84218F24C6A9D8094F6A7C37AE44ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7626985210abb085ff7fa9fd6af944e7e32177b112116157f2d9c68b65b39c4f
                                                          • Instruction ID: 56af9e6dfa97c236c05b8b7bac166dd3a054cf43c4ef3a72ffe217e8c3ebeea5
                                                          • Opcode Fuzzy Hash: 7626985210abb085ff7fa9fd6af944e7e32177b112116157f2d9c68b65b39c4f
                                                          • Instruction Fuzzy Hash: 3311C871D1074ACECB10DFA9C9405DEFBF4EF48310B11966AE558B7211EB31EA81CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152940596.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_157d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0f474674e8d21f4b2b4465c3583ae89219e3179dc558af586bcab4edbe666df2
                                                          • Instruction ID: fb0f9d269e69825c462936f75a2ed939233aee2b13998239edf14523b3e2f41f
                                                          • Opcode Fuzzy Hash: 0f474674e8d21f4b2b4465c3583ae89219e3179dc558af586bcab4edbe666df2
                                                          • Instruction Fuzzy Hash: 1201F2714043449AE7208B99EDC5B2AFFE8FF41320F18C81AEE084E282C3399805C6B1
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 60c60c94834b7514216ad86fbca165d6b66ddc73ef4420db9f7b4fc2edf54df4
                                                          • Instruction ID: 36362c18a325215c9887d5e66a9e9b9b565531782b438dd10e1e9ba3ddde4a83
                                                          • Opcode Fuzzy Hash: 60c60c94834b7514216ad86fbca165d6b66ddc73ef4420db9f7b4fc2edf54df4
                                                          • Instruction Fuzzy Hash: 7C111BB1900209DFDB15CF5AC48479EBEF5FBC9360F24C069E828AB290C7759981CB94
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 92a9acc82531fa2c549ffa574cdeb2d33086a5d69008557f122c15f17f3db5ab
                                                          • Instruction ID: bfaa7b6477ec07d4abad2e93c55cbcdfad9004a56dd6aaa11d360160e8ab45d0
                                                          • Opcode Fuzzy Hash: 92a9acc82531fa2c549ffa574cdeb2d33086a5d69008557f122c15f17f3db5ab
                                                          • Instruction Fuzzy Hash: 4E1161B2900219CFDB24DF59C5497AEBBB5FB88320F14C129E824AB2A0C3754A40CF90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 72e939e90bce1b835b95dbb0c4ce036ff8a3db9ea99a5f545bea91d6e114c0d9
                                                          • Instruction ID: 1e1c4cc51f9f3c0a99a182ba0c8d87ae188a9f86abe6889c69e1bf5b7b2befd6
                                                          • Opcode Fuzzy Hash: 72e939e90bce1b835b95dbb0c4ce036ff8a3db9ea99a5f545bea91d6e114c0d9
                                                          • Instruction Fuzzy Hash: 64F0FC313000128FC608B7BDB41493E72DBBFC9A203150069E006DF361CE61DC026395
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7cb2c9373552e525fd90a8978ab482df153f1867ff854c5c742fcb5279c32359
                                                          • Instruction ID: 138c6a12d670a12e61967b4612c4eca635f0cbf953a8ede04cc9ddf9b6e9a7d5
                                                          • Opcode Fuzzy Hash: 7cb2c9373552e525fd90a8978ab482df153f1867ff854c5c742fcb5279c32359
                                                          • Instruction Fuzzy Hash: 5401EDB1900209DFDB15CF5AC48479EBEF5BFC9360F24C169E828AB290C7759984CB94
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 74fcc05cfc3dfe58a05e9c13a2aa1dadeae31ac8f352914377357d30256c816c
                                                          • Instruction ID: 2807239cfa49d2349ce41939a422e700af4a3cfb31499b1460578ddbada16d40
                                                          • Opcode Fuzzy Hash: 74fcc05cfc3dfe58a05e9c13a2aa1dadeae31ac8f352914377357d30256c816c
                                                          • Instruction Fuzzy Hash: 57F0967BB001255FD714DAA9E891ABBBBE9FBC8330B158076E558DB310D9319C01D7A0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f9a2da397ecd0e7c09bc91aa218669b6e5ba865bb7aefa260c84a04721a92d84
                                                          • Instruction ID: 4665ac698a2564fa814a67e3b97cf5e001da7652743ce92c98bd211af6d96576
                                                          • Opcode Fuzzy Hash: f9a2da397ecd0e7c09bc91aa218669b6e5ba865bb7aefa260c84a04721a92d84
                                                          • Instruction Fuzzy Hash: 7C012CB5D1014ADBEB00DBA4DA517EEB7B1BB8C214F144425C421B7394EA3659058B61
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 851ddbe1e66c4a98de1b3d132db33d8df1fcf32eae7879c9a24339a63ee32929
                                                          • Instruction ID: f77269a7cd986884fa72b43098d3d7f7dc8243f0299fe376339fddd184207faf
                                                          • Opcode Fuzzy Hash: 851ddbe1e66c4a98de1b3d132db33d8df1fcf32eae7879c9a24339a63ee32929
                                                          • Instruction Fuzzy Hash: 11F0A7327041046BE3049A5EEC42F57FBEEFFC8A20F15806BE545D7350CAB0EC0286A5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4152940596.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_157d000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a608e5c760cab8de85a8faf65541b06db07e2beb7bf0c000723305149898723d
                                                          • Instruction ID: c3c0734c76dcc4cadf2b482604290438f63e0b201190a429e40c64e9d6178b97
                                                          • Opcode Fuzzy Hash: a608e5c760cab8de85a8faf65541b06db07e2beb7bf0c000723305149898723d
                                                          • Instruction Fuzzy Hash: FBF04971405348AAE7218A1ADDC5B66FBA8EF81624F18C55AED485E282C379A844CAB1
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0c02841b21bdd98363ef7d0ca6b3c86d8169c2605b55889b3337d72a497e1e90
                                                          • Instruction ID: 8664c6aaa88044d6808b67dc771f037b5ff00f456a0c42f982bb216f7528a032
                                                          • Opcode Fuzzy Hash: 0c02841b21bdd98363ef7d0ca6b3c86d8169c2605b55889b3337d72a497e1e90
                                                          • Instruction Fuzzy Hash: F5F0E5B63142008FD7069A2DCC54A553BE9DFCBA2070900FAE019CB772DA35CC068BA0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe8162213a820ad6e5b9a1bed88cfe2f36314c5a67a46d1e6f79d3e51c3d459b
                                                          • Instruction ID: 1726f09a5582258f464e94ddd0331f1fc69305adadf74076dbce366a070f6ab7
                                                          • Opcode Fuzzy Hash: fe8162213a820ad6e5b9a1bed88cfe2f36314c5a67a46d1e6f79d3e51c3d459b
                                                          • Instruction Fuzzy Hash: FE01FFB1800219DFDB25DF59C4043AE7AF5FF84360F108565E824AB2D0D7754A40CF90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8bdbf94ef3fad0c914f8e9a79d431374bb4d5ac12d48b2626d40bf0d39408c33
                                                          • Instruction ID: d1c2d9217a2492d3ed6dc8269092ab016b1a0297ec28d5d22d4772e6a4ae243d
                                                          • Opcode Fuzzy Hash: 8bdbf94ef3fad0c914f8e9a79d431374bb4d5ac12d48b2626d40bf0d39408c33
                                                          • Instruction Fuzzy Hash: D0E06D767002286F9314DA6EEC84D6BBBEEFBCC670315807AF508C7310D9319C01C6A0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a1b3379743f84c6097931ec77fca42961a45ea8957c2786ef559952587ed8f3e
                                                          • Instruction ID: 0376dad7a41a2d971938d3509311b1631308c1092b01be40fd76e5749571e6cc
                                                          • Opcode Fuzzy Hash: a1b3379743f84c6097931ec77fca42961a45ea8957c2786ef559952587ed8f3e
                                                          • Instruction Fuzzy Hash: BBE09B317002145FD3049A5EEC40E6BFBEDFFD9620B11407AF505D7350CAB0AC0186A4
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 049d678dc573c8e5db557f395895077ce858f454bc9e9b3acd4f0ec53fe43f0f
                                                          • Instruction ID: 3894a4a66900c6cd6657968f5cf68df245f379e037e3976189e1497cce882bdd
                                                          • Opcode Fuzzy Hash: 049d678dc573c8e5db557f395895077ce858f454bc9e9b3acd4f0ec53fe43f0f
                                                          • Instruction Fuzzy Hash: C0F090B000E3C5CFE71357B09819B217FB4BF4220670A04DBE8D5DA1A3CA298594C7B2
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c88af163b44ab0a8c87f7c9c9ea8124add83c147b832a106346545c14bb87ef3
                                                          • Instruction ID: 2cbd4903e2eb29c4c7113157be585d8f8cecdd4c2581cf3b2820ec27a772e732
                                                          • Opcode Fuzzy Hash: c88af163b44ab0a8c87f7c9c9ea8124add83c147b832a106346545c14bb87ef3
                                                          • Instruction Fuzzy Hash: F7E0C2B231010067F704515AEC83BBB666FEBC4A71F09402AFA05D3240CD51880282B9
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: aa454a0ab9db6c75843dc94e40372c035d66317dceefda956c0c689d395e7db4
                                                          • Instruction ID: 250b495574f657618bc7780a24a4fea2eab6eea697991a4e6bfe84433f070d39
                                                          • Opcode Fuzzy Hash: aa454a0ab9db6c75843dc94e40372c035d66317dceefda956c0c689d395e7db4
                                                          • Instruction Fuzzy Hash: 88E086363001009FC3108A4EDC84D06FBEDEFC8630B10806AF609C7360C930AC01C664
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 100eeeedcaf31edcc106e0360f3a18ba54b0b0c9e67b163e2980ba5de33aea21
                                                          • Instruction ID: 253c293ece8a8d55126d30919c613339f19041978bf332d05c0c96281a44aeb3
                                                          • Opcode Fuzzy Hash: 100eeeedcaf31edcc106e0360f3a18ba54b0b0c9e67b163e2980ba5de33aea21
                                                          • Instruction Fuzzy Hash: 96E0EC353105148FC744DB2ED448C1977EAEFCEA2531540BAE509CB331DE72DC018B90
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a8596a66d247898c498ab79e1acd9a52cef5cec66b83df5f01939a778f989c9a
                                                          • Instruction ID: 410fcb91aa85c1914a7351ea985864f8e6cefe57528a5ba3e0f6b8c20c73f180
                                                          • Opcode Fuzzy Hash: a8596a66d247898c498ab79e1acd9a52cef5cec66b83df5f01939a778f989c9a
                                                          • Instruction Fuzzy Hash: 6BE017B0526300CFDB552BF0E41E62ABF75FE95306348486EF816E2655EF3A9480CBC0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 282afeec918bb9bce1ac3b2794949b18b4f3b4b35edb082c7c16f2e793249121
                                                          • Instruction ID: 0cfea147004cc53d8a17533cb3ffeb15e27a127376658ff51229ea908e6794ff
                                                          • Opcode Fuzzy Hash: 282afeec918bb9bce1ac3b2794949b18b4f3b4b35edb082c7c16f2e793249121
                                                          • Instruction Fuzzy Hash: 9DD0127091420AEBCB00DFF4E95696DB7F9EB45314B104599D805E7201EA316E009BD0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c1f9e2ecfc16d609a3299598bd523f924f288a574f140bcd8f62243fb5b2a44b
                                                          • Instruction ID: 71b658a6f51c2814932745af7ee33be1f1da940e70c045397b1ffd70efdb8c83
                                                          • Opcode Fuzzy Hash: c1f9e2ecfc16d609a3299598bd523f924f288a574f140bcd8f62243fb5b2a44b
                                                          • Instruction Fuzzy Hash: 29E01270115305CFD7506BF1E40EB25BFA8FF857063040855F811E2151DF36E890CAE0
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.4160684015.0000000007A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_7a40000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 875a6dd5ab387ea74a19f631ad152c2d3ac506dc105415f07a28d976034163d1
                                                          • Instruction ID: c5d82c7cbb3b49c6242619f6ba9ca4e1ac546badd03f9b198c957cba42879ac1
                                                          • Opcode Fuzzy Hash: 875a6dd5ab387ea74a19f631ad152c2d3ac506dc105415f07a28d976034163d1
                                                          • Instruction Fuzzy Hash: F8C08CBF0000007FCB08E640CC08B8AFAB2AF04A04F8488205400A6120CA22C4569B25

                                                          Execution Graph

                                                          Execution Coverage:18.1%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:94
                                                          Total number of Limit Nodes:5
                                                          execution_graph 36013 17677e6 36015 1767365 36013->36015 36014 1767731 36015->36014 36017 17697d0 36015->36017 36018 17697e5 36017->36018 36019 17697de 36017->36019 36018->36019 36021 176c060 36018->36021 36019->36015 36022 176c0df CreateProcessAsUserW 36021->36022 36024 176c1e0 36022->36024 36048 53bc8e8 36049 53bc930 VirtualProtect 36048->36049 36050 53bc96a 36049->36050 35998 184ca00 35999 184ca46 35998->35999 36003 184cfd8 35999->36003 36007 184cfe8 35999->36007 36000 184cb33 36004 184cfdd 36003->36004 36010 184cbfc 36004->36010 36008 184d016 36007->36008 36009 184cbfc DuplicateHandle 36007->36009 36008->36000 36009->36008 36011 184d050 DuplicateHandle 36010->36011 36012 184d016 36011->36012 36012->36000 36029 176f2d0 36030 176f315 Wow64SetThreadContext 36029->36030 36032 176f35d 36030->36032 36040 176f940 36041 176f980 ResumeThread 36040->36041 36043 176f9b1 36041->36043 36051 176dc20 36052 176dc65 Wow64GetThreadContext 36051->36052 36054 176dcad 36052->36054 36033 16f1ac8 36034 16f1c53 36033->36034 36036 16f1aee 36033->36036 36036->36034 36037 16f1220 36036->36037 36038 16f1d48 PostMessageW 36037->36038 36039 16f1db4 36038->36039 36039->36036 36055 53bb850 36056 53bb864 36055->36056 36057 53bb8dd 36056->36057 36065 1762aeb 36056->36065 36069 1762c9d 36056->36069 36073 176377d 36056->36073 36077 17635ec 36056->36077 36081 1762e02 36056->36081 36085 1764527 36056->36085 36089 1763597 36056->36089 36093 1764a40 36065->36093 36097 1764a48 36065->36097 36066 1762afc 36071 1764a40 VirtualProtect 36069->36071 36072 1764a48 VirtualProtect 36069->36072 36070 1762cc1 36071->36070 36072->36070 36075 1764a40 VirtualProtect 36073->36075 36076 1764a48 VirtualProtect 36073->36076 36074 1763797 36075->36074 36076->36074 36079 1764a40 VirtualProtect 36077->36079 36080 1764a48 VirtualProtect 36077->36080 36078 176362a 36079->36078 36080->36078 36083 1764a40 VirtualProtect 36081->36083 36084 1764a48 VirtualProtect 36081->36084 36082 1762e13 36083->36082 36084->36082 36087 1764a40 VirtualProtect 36085->36087 36088 1764a48 VirtualProtect 36085->36088 36086 1764538 36087->36086 36088->36086 36091 1764a40 VirtualProtect 36089->36091 36092 1764a48 VirtualProtect 36089->36092 36090 17635ab 36091->36090 36092->36090 36094 1764a44 VirtualProtect 36093->36094 36096 1764aca 36094->36096 36096->36066 36098 1764a90 VirtualProtect 36097->36098 36099 1764aca 36098->36099 36099->36066 36100 184a678 36101 184a687 36100->36101 36104 184a760 36100->36104 36109 184a770 36100->36109 36105 184a7a4 36104->36105 36106 184a781 36104->36106 36105->36101 36106->36105 36107 184a9a8 GetModuleHandleW 36106->36107 36108 184a9d5 36107->36108 36108->36101 36110 184a781 36109->36110 36111 184a7a4 36109->36111 36110->36111 36112 184a9a8 GetModuleHandleW 36110->36112 36111->36101 36113 184a9d5 36112->36113 36113->36101 36025 176eae8 36026 176eb30 VirtualProtectEx 36025->36026 36028 176eb6e 36026->36028 36044 176e648 36045 176e690 WriteProcessMemory 36044->36045 36047 176e6e7 36045->36047 36114 176e308 36115 176e348 VirtualAllocEx 36114->36115 36117 176e385 36115->36117

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4192 53bc8b4-53bc8e2 4193 53bc8e5-53bc968 VirtualProtect 4192->4193 4194 53bc8e4 4192->4194 4197 53bc96a-53bc970 4193->4197 4198 53bc971-53bc992 4193->4198 4194->4193 4197->4198
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 053BC95B
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4301088924.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_53b0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: b311d3ada0a44fe68d403d0bbe8edd5730ad4f7d007bffaaf0bf1ff983f743bb
                                                          • Instruction ID: b50545b02e7cc26f23f7e03043db55aa10a7dfd626bd4a233927b1ef78bd62f3
                                                          • Opcode Fuzzy Hash: b311d3ada0a44fe68d403d0bbe8edd5730ad4f7d007bffaaf0bf1ff983f743bb
                                                          • Instruction Fuzzy Hash: 9D218B758043899FDB11CFA9C884ADEBFF8BB49310F10845AE558E7251D778A944CFA2
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 053BC95B
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4301088924.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_53b0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: fb7b269e24f78633948407087b6b2baa7c0f610b4686c55b4d4bdd19fada6d99
                                                          • Instruction ID: 487fff976fa3f240ad8aca50442cbba84c962135cdfb9106d62be60b1e2e67af
                                                          • Opcode Fuzzy Hash: fb7b269e24f78633948407087b6b2baa7c0f610b4686c55b4d4bdd19fada6d99
                                                          • Instruction Fuzzy Hash: 1621E775904249DFDB10DF9AD984BDEFBF4FB48310F10842AE558A7251D378A944CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 016F1DA5
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4296529426.00000000016F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_16f0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: 6b17312a86e8c034ec3da85157f7fe36afd0fc4adfacbf4788ee6176f787820d
                                                          • Instruction ID: 6ce3dec0edc72243686fe3ac04b77bbeeb4cb1592315b59ad510448a8167900e
                                                          • Opcode Fuzzy Hash: 6b17312a86e8c034ec3da85157f7fe36afd0fc4adfacbf4788ee6176f787820d
                                                          • Instruction Fuzzy Hash: 4B11F2B5804349DFDB10DF9AD889BDEBBF8EB49310F108419EA18A7240D3B5A944CFA1
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 016F1DA5
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4296529426.00000000016F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016F0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_16f0000_workbook.jbxd
                                                          Similarity
                                                          • API ID: MessagePost
                                                          • String ID:
                                                          • API String ID: 410705778-0
                                                          • Opcode ID: a9c4fbc89c915ccec9023692652975e59bda8559332d2bebfa3d9805d5e81308
                                                          • Instruction ID: 8fe64541ff9e9971480483f44408a9d9397a74cc9c467575e8e5619da11379a6
                                                          • Opcode Fuzzy Hash: a9c4fbc89c915ccec9023692652975e59bda8559332d2bebfa3d9805d5e81308
                                                          • Instruction Fuzzy Hash: 761122B5800349DFDB10DF9AD884BDEBBF8EB49320F10845AD958A7250D375A984CFA1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b3f81fc40bdd8fa33a61a6cbffa7320c4915b41ee2c50047daa7054c1de8806a
                                                          • Instruction ID: 5de9a34cc093791c7c2d757a076cc6ebc79a46f3073ff694ad6bcb2f4678714c
                                                          • Opcode Fuzzy Hash: b3f81fc40bdd8fa33a61a6cbffa7320c4915b41ee2c50047daa7054c1de8806a
                                                          • Instruction Fuzzy Hash: BB122A70B11215CBCB04AFB9E89966EBBF6FF89700F41892DE445A7360DE3DAC058752
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c1763feda985c81dd59e5023dfbfbedd96f198dff35cdb8c95f3b2a47356669d
                                                          • Instruction ID: 51aca25911c87583545864d18a1cd8cd2697387d551cf89fe6377a615245978d
                                                          • Opcode Fuzzy Hash: c1763feda985c81dd59e5023dfbfbedd96f198dff35cdb8c95f3b2a47356669d
                                                          • Instruction Fuzzy Hash: 44122A70B11215CBCB04AFB9E89966EBBF6FF89700F41892DE445A7360DE3DAC058752
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 53498ebb275dd6641499e0f0f95520b1d61f3551cfb1445476b42d3dd1112cac
                                                          • Instruction ID: fa3737704ae881450c8adf27186bdf07d9267905ac19fb399be12ddde4b0ff41
                                                          • Opcode Fuzzy Hash: 53498ebb275dd6641499e0f0f95520b1d61f3551cfb1445476b42d3dd1112cac
                                                          • Instruction Fuzzy Hash: 71F14AB0B15215CFC704EFB9D49466A77AAFF9A600B5188ADD406DB360DF3AEC01CB51
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a4bd06a1148e831872765e687c27cb5883ad50221af176700b96422a47ef963a
                                                          • Instruction ID: ef1138baa760d82b31180036a9cbaee2c3b5284cddc92b3d619fd74836a81432
                                                          • Opcode Fuzzy Hash: a4bd06a1148e831872765e687c27cb5883ad50221af176700b96422a47ef963a
                                                          • Instruction Fuzzy Hash: F7D11270B14205CBCB04FFB9E89926EBBBAEFC9210F55486EE045E7350DE395C1583A2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 627cd5eff673a7e913c38cfd3a47118c36429c2bd407d0569564cf7930174450
                                                          • Instruction ID: efbf4d863eafcdf435f27c6f9a706b0cb4781f39abc2d3e4127bcd167919a278
                                                          • Opcode Fuzzy Hash: 627cd5eff673a7e913c38cfd3a47118c36429c2bd407d0569564cf7930174450
                                                          • Instruction Fuzzy Hash: 7BA1AFB0E01349DFDB14DFA9C49469DBBF5FF89310F249959E409AB390DB70A881CB91
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 672f059e554e22d843d18630f7347058d6f197aeebe41d91cdcfbbf72e3fe48d
                                                          • Instruction ID: 902d8236f0a25fca509b6a52bee7e65c2fdb096d89d99653dc31c3f580cac293
                                                          • Opcode Fuzzy Hash: 672f059e554e22d843d18630f7347058d6f197aeebe41d91cdcfbbf72e3fe48d
                                                          • Instruction Fuzzy Hash: 8451C7B1E0170ADBDB14DFA9C8506ADF7F5FF89314F14CA29E405A7250EB709981CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3859dc58fb1424b008941da04bd680b99d4bdd9714984907510eb69df10ad3d8
                                                          • Instruction ID: dd848d75384be87544df8507d1de653b7176f85c2661733d8cb88bb6f5e332d7
                                                          • Opcode Fuzzy Hash: 3859dc58fb1424b008941da04bd680b99d4bdd9714984907510eb69df10ad3d8
                                                          • Instruction Fuzzy Hash: 4E3148B1D15249CFDF00DFA9D944ADEBBF9BB89200F108929E505B7390DB785905CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292342769.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15dd000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ba8f4a6f3e5a075891e4059eb2947294854e0cc88fc89addbb20c13f245318a9
                                                          • Instruction ID: cd1f3f5b9de0ae3364d3e63a7ceb6313b92f426fb4adfd5d68c4901218924d41
                                                          • Opcode Fuzzy Hash: ba8f4a6f3e5a075891e4059eb2947294854e0cc88fc89addbb20c13f245318a9
                                                          • Instruction Fuzzy Hash: 5E21F471504204DFDB25DF9CD9C0B2ABFB5FB88314F248569E9090E296C376D456CBA1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292430789.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15ed000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d3dcec9d2fcc53f645cb6d8fe6d4bd628f4455d8ee5066f9e7ffa0555e45eb48
                                                          • Instruction ID: 536ace0d9dba5343927a31455a5d40e1f1f8b96d8370087007040fc819921c77
                                                          • Opcode Fuzzy Hash: d3dcec9d2fcc53f645cb6d8fe6d4bd628f4455d8ee5066f9e7ffa0555e45eb48
                                                          • Instruction Fuzzy Hash: A121F175904204DFDB19DF58D588B16BFE1FB84314F28C96DE90A0F242D33AD406CA61
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292430789.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15ed000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: da6ab69322a4f5788f5eeaa5790acacad0dc334d97895925997936d5acf05365
                                                          • Instruction ID: 469f43b1ece40378564ab81b2be54f56e01cf47da620823942c3510871eb9485
                                                          • Opcode Fuzzy Hash: da6ab69322a4f5788f5eeaa5790acacad0dc334d97895925997936d5acf05365
                                                          • Instruction Fuzzy Hash: 09210375900204DFDB09DF98D588B1ABBF1FB88314F24C5ADE9094F282C376E846CA61
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292430789.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15ed000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 10d94eaf0e08fb12c8e40b89a3a2129fc97a6c9fbf91fccd003318b769faeb70
                                                          • Instruction ID: a2990e425b72840d4c67febe7ade8ffb7350046e8706b8f5a645ea0013384a13
                                                          • Opcode Fuzzy Hash: 10d94eaf0e08fb12c8e40b89a3a2129fc97a6c9fbf91fccd003318b769faeb70
                                                          • Instruction Fuzzy Hash: AB219F755093848FCB07CF24D994715BFB1FB46214F29C5EAD8498F2A7D33A980ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292342769.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15dd000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                          • Instruction ID: 4a6ff2c4a07b7d793abd9c1280cabcab1af3058b79c36a5bd52670ab8de15253
                                                          • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                                          • Instruction Fuzzy Hash: 7711AF76504244DFDB16CF58D9C4B1ABF71FB84324F2486A9D9090B257C33AD45ACBA2
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3bb9d4bc6e5eacf467c794d4e48b26d38282c62f6c748296ef45a26be010b98a
                                                          • Instruction ID: b129071d8dae2662b036e67bdd2cfdebfc071b12c4c928e5466db2cfd82e59ad
                                                          • Opcode Fuzzy Hash: 3bb9d4bc6e5eacf467c794d4e48b26d38282c62f6c748296ef45a26be010b98a
                                                          • Instruction Fuzzy Hash: FB115CB160E7848FE302D764D85C7253FB8EF86208B0518AFE0C6C7352DA355C41C311
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292430789.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15ed000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction ID: 33eaa70018a43ac2b86ed5436e19c5cbbcd73947e0364a869fdef05c73285834
                                                          • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                                          • Instruction Fuzzy Hash: FA11BB75904284CFCB06CF58D5C8B19BBB1FB84218F24C6A9D8094F657C37AE44ACB62
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292342769.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15dd000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c77ac84c95268d574e719f02bf912a1585d6cc18c8c2897a22e3a99cf7e07666
                                                          • Instruction ID: e208765f16f8d770678122a14042796ad8e5ee719baf5ffc4bb3ae7b11b33996
                                                          • Opcode Fuzzy Hash: c77ac84c95268d574e719f02bf912a1585d6cc18c8c2897a22e3a99cf7e07666
                                                          • Instruction Fuzzy Hash: 18018F714093449AE7318AADCD84B6ABFA8FB41360F18C55AEE094E2C2C2699844C7B1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6c9be90882de63c7bf57a4e1ee5112bb5fa275727b6371547257b977cf4a7d70
                                                          • Instruction ID: 8439ae6300f505e134d83dc5b6aa7892fe983a037dd61d83f7726e98c9e4a2e4
                                                          • Opcode Fuzzy Hash: 6c9be90882de63c7bf57a4e1ee5112bb5fa275727b6371547257b977cf4a7d70
                                                          • Instruction Fuzzy Hash: C00184B0D1525BCBDF00DB90C9547EEB7B9AF49304F105469D801B7294EB755D05CFA0
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4292342769.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_15dd000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9609bd16f98553b138d3ad0755738662776abcd2f87a87b44c80c4e7fbcc3657
                                                          • Instruction ID: 875db2e84e5c36918be88ea9ab5451f172fd914a0da6c7e22624bf81c5828ef9
                                                          • Opcode Fuzzy Hash: 9609bd16f98553b138d3ad0755738662776abcd2f87a87b44c80c4e7fbcc3657
                                                          • Instruction Fuzzy Hash: 6DF0C271405344AEE7218E0DCC84B66FFA8FB40624F18C55AED0C0F2C2C3789844CBB1
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 720ff8a15b9bb89206af4022dcb4a829079a6f1a89257420dc116e010ea596ff
                                                          • Instruction ID: 440ae5ff2167bf732b21c4f95ee1b475ae54b18144b33edc3bca111debbc345d
                                                          • Opcode Fuzzy Hash: 720ff8a15b9bb89206af4022dcb4a829079a6f1a89257420dc116e010ea596ff
                                                          • Instruction Fuzzy Hash: 34017CB1C0161ACFDB25CFA9D8443EE7BF9FF04324F108519D528AB2A0C7744A80CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000D.00000002.4306349796.0000000007EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EE0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_13_2_7ee0000_workbook.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e655b3fd09acbc2fa455ad5c08b3e8d58c01cc0e256aa46a814231262f49129
                                                          • Instruction ID: 5518d2942b1d514af3ea2eae0931d8b861e44c7c1df484fc804b0e7e54f6330c
                                                          • Opcode Fuzzy Hash: 1e655b3fd09acbc2fa455ad5c08b3e8d58c01cc0e256aa46a814231262f49129
                                                          • Instruction Fuzzy Hash: 37E01270526644DFD7559B31E41E1753F75FF9530930858AEF48681654DF359880C740