Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
F7fahhucBo.exe

Overview

General Information

Sample name:F7fahhucBo.exe
renamed because original name is a hash value
Original sample name:ac83ee8e909f55b86251b145cfa42c66.exe
Analysis ID:1484483
MD5:ac83ee8e909f55b86251b145cfa42c66
SHA1:ca465e5d157330d98feac14a18f6a252162cd270
SHA256:bc4a818268862ec3af1e56dd94c9958e18bde15be09e9412a802903c3ff6dacd
Tags:32exe
Infos:

Detection

Poverty Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Poverty Stealer
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to query CPU information (cpuid)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • F7fahhucBo.exe (PID: 564 cmdline: "C:\Users\user\Desktop\F7fahhucBo.exe" MD5: AC83EE8E909F55B86251B145CFA42C66)
    • CasPol.exe (PID: 1104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
{"C2 url": "85.244.212.106:2227"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
    00000000.00000002.1265265580.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
      Process Memory Space: F7fahhucBo.exe PID: 564JoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
        Process Memory Space: CasPol.exe PID: 1104JoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          2.2.CasPol.exe.400000.0.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            0.2.F7fahhucBo.exe.2aee300.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              0.2.F7fahhucBo.exe.2ae6ca4.0.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                0.2.F7fahhucBo.exe.2af6308.2.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  0.2.F7fahhucBo.exe.2af6308.2.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                    Click to see the 3 entries
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-30T07:25:47.654438+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49709
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-30T07:24:54.370940+0200
                    SID:2048736
                    Source Port:49702
                    Destination Port:2227
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-30T07:25:05.314234+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49703
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: F7fahhucBo.exeAvira: detected
                    Source: 0.2.F7fahhucBo.exe.2af6308.2.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "85.244.212.106:2227"}
                    Source: F7fahhucBo.exeVirustotal: Detection: 50%Perma Link
                    Source: F7fahhucBo.exeReversingLabs: Detection: 68%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: F7fahhucBo.exeJoe Sandbox ML: detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00401D21 CryptUnprotectData,CryptProtectData,2_2_00401D21
                    Source: F7fahhucBo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: CasPol.exe, 00000002.00000002.1373118694.000000000AA7D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352116648.0000000009730000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1355601662.0000000009BD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5D2000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE0000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1373118694.000000000AA72000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2CF000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF8F000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352780051.00000000098A4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ntkrnlmp.pdb source: CasPol.exe, 00000002.00000002.1373118694.000000000AA7D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF89000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE3000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ..pdbd source: CasPol.exe, 00000002.00000002.1423070914.000000000C9F5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1464732840.000000000DB6B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1394768890.000000000B8E6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1381378304.000000000B002000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1489563308.000000000E3C5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1407408447.000000000C15C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1445493849.000000000D28E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1515767209.000000000EC9A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1359488355.000000000A024000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1368605605.000000000A79A000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ntkrnlmp.pdbx6 source: CasPol.exe, 00000002.00000002.1352116648.0000000009730000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1355601662.0000000009BD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5D2000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1373118694.000000000AA72000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2CF000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF8F000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352780051.00000000098A4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: CasPol.exe, 00000002.00000002.1351204271.0000000000FC4000.00000004.00000020.00020000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00401000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,2_2_00401000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00401DC9 FindFirstFileW,FindNextFileW,2_2_00401DC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00404EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,2_2_00404EB2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00404145 FindFirstFileW,FindNextFileW,2_2_00404145
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00403F87 FindFirstFileW,FindNextFileW,2_2_00403F87
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 85.244.212.106:2227
                    Source: global trafficTCP traffic: 192.168.2.7:49702 -> 185.244.212.106:2227
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ic
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.sea
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chromL
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chro
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bing.co
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/search?q=
                    Source: CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00404C2D GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,2_2_00404C2D

                    System Summary

                    barindex
                    Source: F7fahhucBo.exe, Program.csLong String: Length: 40300
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeCode function: 0_2_029219C00_2_029219C0
                    Source: F7fahhucBo.exe, 00000000.00000002.1264643748.0000000000D8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs F7fahhucBo.exe
                    Source: F7fahhucBo.exe, 00000000.00000000.1262952876.0000000000832000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNetStub.exe0 vs F7fahhucBo.exe
                    Source: F7fahhucBo.exeBinary or memory string: OriginalFilenameNetStub.exe0 vs F7fahhucBo.exe
                    Source: F7fahhucBo.exe, Program.csBase64 encoded string: 'QzpcV2luZG93c1xNaWNyb3NvZnQuTkVUXEZyYW1ld29ya1x2NC4wLjMwMzE5XENhc1BvbC5leGU='
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/1
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\F7fahhucBo.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\0060cbb5-1dbd-468c-b2ba-03be756aa1c1
                    Source: F7fahhucBo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: F7fahhucBo.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: CasPol.exe, 00000002.00000002.1500480152.000000000E788000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: F7fahhucBo.exeVirustotal: Detection: 50%
                    Source: F7fahhucBo.exeReversingLabs: Detection: 68%
                    Source: unknownProcess created: C:\Users\user\Desktop\F7fahhucBo.exe "C:\Users\user\Desktop\F7fahhucBo.exe"
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                    Source: F7fahhucBo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: F7fahhucBo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: CasPol.exe, 00000002.00000002.1373118694.000000000AA7D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352116648.0000000009730000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1355601662.0000000009BD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5D2000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE0000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1373118694.000000000AA72000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2CF000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF8F000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352780051.00000000098A4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ntkrnlmp.pdb source: CasPol.exe, 00000002.00000002.1373118694.000000000AA7D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5DA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF89000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE3000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ..pdbd source: CasPol.exe, 00000002.00000002.1423070914.000000000C9F5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1464732840.000000000DB6B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1394768890.000000000B8E6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1381378304.000000000B002000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1489563308.000000000E3C5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1407408447.000000000C15C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1445493849.000000000D28E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1515767209.000000000EC9A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1359488355.000000000A024000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1368605605.000000000A79A000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: ntkrnlmp.pdbx6 source: CasPol.exe, 00000002.00000002.1352116648.0000000009730000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1355601662.0000000009BD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1452918072.000000000D5D2000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1398986542.000000000BBAE000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1373118694.000000000AA72000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1362538204.000000000A258000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1386828744.000000000B2CF000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1524823685.000000000EF8F000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1472365915.000000000DE5C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1498869793.000000000E72E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1429763194.000000000CCE6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1414043221.000000000C44C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1352780051.00000000098A4000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: CasPol.exe, 00000002.00000002.1351204271.0000000000FC4000.00000004.00000020.00020000.00000000.sdmp
                    Source: F7fahhucBo.exeStatic PE information: 0xD0BCD7F5 [Sat Dec 21 20:03:01 2080 UTC]
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_2-2312
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory allocated: 4AA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exe TID: 4852Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00401000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,2_2_00401000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00401DC9 FindFirstFileW,FindNextFileW,2_2_00401DC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00404EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,2_2_00404EB2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00404145 FindFirstFileW,FindNextFileW,2_2_00404145
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_00403F87 FindFirstFileW,FindNextFileW,2_2_00403F87
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_004020E1 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,2_2_004020E1
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                    Source: CasPol.exe, 00000002.00000002.1353544419.000000000999D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.co..microsoft.visualstudio.comVMware20,11696492231x
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1353544419.000000000999D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                    Source: CasPol.exe, 00000002.00000002.1491254995.000000000E45C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                    Source: CasPol.exe, 00000002.00000002.1414962318.000000000C4C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                    Source: CasPol.exe, 00000002.00000002.1502505042.000000000E890000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_004035C3 GetProcessHeap,RtlFreeHeap,2_2_004035C3
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: F7fahhucBo.exe, MTD.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: F7fahhucBo.exe, MTD.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                    Source: F7fahhucBo.exe, MTD.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
                    Source: F7fahhucBo.exe, MTD.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num2, length, 12288, 64)
                    Source: F7fahhucBo.exe, MTD.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num4, payload, bufferSize, ref bytesRead)
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 407000Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 408000Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 409000Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: C74008Jump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 2_2_004020E1 cpuid 2_2_004020E1
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeQueries volume information: C:\Users\user\Desktop\F7fahhucBo.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\F7fahhucBo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 2.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2aee300.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2ae6ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2af6308.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2af6308.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2aee300.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2ae6ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1265265580.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: F7fahhucBo.exe PID: 564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1104, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 2.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2aee300.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2ae6ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2af6308.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2af6308.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2aee300.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.F7fahhucBo.exe.2ae6ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1265265580.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: F7fahhucBo.exe PID: 564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 1104, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    311
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    11
                    Security Software Discovery
                    Remote Services1
                    Screen Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory31
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                    Virtualization/Sandbox Evasion
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Data from Local System
                    1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                    Process Injection
                    NTDS23
                    System Information Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Timestomp
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    F7fahhucBo.exe51%VirustotalBrowse
                    F7fahhucBo.exe68%ReversingLabsByteCode-MSIL.Trojan.LummaStealer
                    F7fahhucBo.exe100%AviraTR/Dropper.Gen
                    F7fahhucBo.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
                    http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    https://duckduckgo.com/?q=0%VirustotalBrowse
                    https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                    https://www.bing.co0%VirustotalBrowse
                    https://www.bing.co0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    85.244.212.106:22270%Avira URL Cloudsafe
                    https://www.ecosia.org/search?q=0%Avira URL Cloudsafe
                    https://ch.search.yahoo.com/sugg/chromL0%Avira URL Cloudsafe
                    https://cdn.ecosia.org/assets/images/ic0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                    https://duckduckgo.com/chro0%Avira URL Cloudsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.sea0%Avira URL Cloudsafe
                    https://www.ecosia.org/search?q=0%VirustotalBrowse
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                    https://duckduckgo.com/chro1%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    85.244.212.106:2227true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoCasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/?q=CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.bing.coCasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/search?q=CasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://x1.c.lencr.org/0CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.i.lencr.org/0CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chromLCasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchCasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/icCasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crt.rootca1.amazontrust.com/rootca1.cer0?CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.rootca1.amazontrust.com/rootca1.crl0CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.rootca1.amazontrust.com0:CasPol.exe, 00000002.00000002.1527095126.000000000F017000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=CasPol.exe, 00000002.00000002.1353318658.0000000009946000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1399914660.000000000BC70000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1356160255.0000000009C9E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1431024556.000000000CDAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000002.00000002.1363507875.000000000A32D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/chroCasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.seaCasPol.exe, 00000002.00000002.1491036729.000000000E43A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.244.212.106
                    unknownRomania
                    9009M247GBfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1484483
                    Start date and time:2024-07-30 07:23:50 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 57s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:17
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:F7fahhucBo.exe
                    renamed because original name is a hash value
                    Original Sample Name:ac83ee8e909f55b86251b145cfa42c66.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 30
                    • Number of non-executed functions: 7
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.244.212.106IxE6TjWjRM.exeGet hashmaliciousPoverty StealerBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      M247GBCOMANDA BELOR NR13 DIN 240715.xlsGet hashmaliciousRemcosBrowse
                      • 194.187.251.115
                      AKPSrAWl2G.elfGet hashmaliciousMiraiBrowse
                      • 193.32.99.139
                      5oXS6HtbzC.elfGet hashmaliciousMiraiBrowse
                      • 185.90.60.83
                      AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                      • 194.187.251.115
                      danabot.exeGet hashmaliciousDanaBotBrowse
                      • 172.86.76.246
                      danabot.exeGet hashmaliciousDanaBotBrowse
                      • 172.86.76.246
                      file.exeGet hashmaliciousSystemBCBrowse
                      • 89.238.188.232
                      LisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                      • 38.207.19.49
                      LisectAVT_2403002B_374.exeGet hashmaliciousXenoRATBrowse
                      • 37.120.141.155
                      LisectAVT_2403002B_374.exeGet hashmaliciousXenoRATBrowse
                      • 37.120.141.155
                      No context
                      No context
                      Process:C:\Users\user\Desktop\F7fahhucBo.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):425
                      Entropy (8bit):5.353683843266035
                      Encrypted:false
                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                      MD5:859802284B12C59DDBB85B0AC64C08F0
                      SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                      SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                      SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):4.306187851644185
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:F7fahhucBo.exe
                      File size:92'160 bytes
                      MD5:ac83ee8e909f55b86251b145cfa42c66
                      SHA1:ca465e5d157330d98feac14a18f6a252162cd270
                      SHA256:bc4a818268862ec3af1e56dd94c9958e18bde15be09e9412a802903c3ff6dacd
                      SHA512:dcd57a67726525d5f12d19a37e65eb4de5539599efa7a9781c008eda1b710172f44a79603ebd15b42707210091a1b6cfefec2959d71efbcfaf59914a3e380323
                      SSDEEP:1536:WWayDEpCdzqHFv8FIcHFbd8iZyACQk6r4L8mPaNJNUzLata/fn:WWayDEpC4vTclTycke4o0aNzUF3
                      TLSH:2B933C243EFA502AF173EF765BE87996DA6FB6332B07A45E109003460B23A81DDD153D
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0..^...........}... ........@.. ....................................`................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x417dee
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0xD0BCD7F5 [Sat Dec 21 20:03:01 2080 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x17d940x57.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x180000x596.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x15df40x15e00ff56ef7f8709c10d6b2dcd878adc19f9False0.5005022321428572data4.316094119837649IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x180000x5960x60092b255ce996701e84bb56ddf4acad581False0.4114583333333333data4.045231581385585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1a0000xc0x2003e4b63f141f3557c9f3a8194cdc25afaFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x180a00x30cdata0.4230769230769231
                      RT_MANIFEST0x183ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-30T07:25:47.654438+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970920.114.59.183192.168.2.7
                      2024-07-30T07:24:54.370940+0200TCP2048736ET MALWARE PovertyStealer Exfiltration M3497022227192.168.2.7185.244.212.106
                      2024-07-30T07:25:05.314234+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970320.114.59.183192.168.2.7
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 30, 2024 07:24:54.360233068 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.365083933 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.365185976 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.365236044 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.365526915 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.370008945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370066881 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.370666981 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370692015 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370711088 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370721102 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370740891 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370759964 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370769024 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370779037 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.370939970 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.374778032 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.374830008 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.374870062 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.374919891 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.375705004 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.375751972 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.375790119 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.375838995 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.375854969 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.375864029 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.375874043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.375916004 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.418363094 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.418490887 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.466238976 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.466371059 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.514143944 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.514216900 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.562203884 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.562269926 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.611331940 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.611397028 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.662163019 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.662223101 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.710433960 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.710491896 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.758155107 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.758212090 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.806170940 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.806241035 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.826076031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.826256990 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831182957 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831204891 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831243992 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831265926 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831268072 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831275940 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831295013 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831304073 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831320047 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831357956 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831394911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831407070 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831440926 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831450939 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831500053 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831509113 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831554890 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831593037 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831603050 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831619978 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831629038 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831635952 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831638098 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831646919 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831705093 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831718922 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831763983 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831765890 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831773996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831783056 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831800938 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831816912 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831824064 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831840992 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831868887 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831904888 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831929922 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831974030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.831975937 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.831984043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832000971 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832025051 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.832050085 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.832056046 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832102060 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.832118988 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832128048 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832160950 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.832202911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.832250118 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836128950 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836142063 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836159945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836180925 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836206913 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836251974 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836261034 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836299896 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836317062 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836340904 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836357117 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836385012 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836400986 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836401939 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836442947 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836452007 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836498022 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836585999 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836595058 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836606979 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836648941 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836687088 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836698055 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836707115 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836715937 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836734056 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836735010 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836745024 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836761951 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836771011 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836786985 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836800098 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836803913 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836808920 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836817980 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836842060 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836852074 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836854935 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836896896 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836906910 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836909056 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836947918 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.836975098 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.836987019 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837004900 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837013960 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837016106 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837049961 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837058067 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837093115 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837116003 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837156057 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837157965 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837167025 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837176085 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837201118 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837217093 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837222099 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837227106 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837236881 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837266922 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837271929 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837279081 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837282896 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837301016 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837311029 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837316036 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837321043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837327957 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837331057 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837359905 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837362051 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837369919 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837377071 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837387085 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837395906 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837416887 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837424040 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837431908 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837434053 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837476969 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837486029 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837486029 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837496996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837519884 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837533951 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837541103 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837549925 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837562084 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837573051 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837605000 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837697029 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837707043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837714911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837723970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837733030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837742090 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837760925 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837763071 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837775946 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837775946 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837785959 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837800026 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837810040 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837811947 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837826014 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837826967 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837831974 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837841034 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.837843895 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.837886095 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841087103 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841120958 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841130018 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841134071 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841146946 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841173887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841182947 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841197968 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841211081 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841222048 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841223001 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841259003 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841273069 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841305017 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841315031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841361046 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841362000 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841372013 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841386080 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841406107 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841423988 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841432095 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841443062 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841444016 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841469049 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841475964 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841478109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841500998 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841516018 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841523886 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841540098 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841583014 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841593027 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841605902 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841615915 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841631889 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841638088 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841650009 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841670990 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841672897 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841702938 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841794014 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841803074 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841836929 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841847897 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841855049 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841864109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841875076 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841883898 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841906071 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841916084 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841927052 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841934919 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841934919 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841945887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841970921 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841974974 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841979980 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.841991901 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.841999054 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842009068 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842015982 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842068911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842071056 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842077971 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842087030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842112064 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842119932 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842128992 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842133999 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842137098 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842173100 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842181921 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842183113 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842207909 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842216969 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842227936 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842268944 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842273951 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842291117 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842318058 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842331886 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842374086 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842384100 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842426062 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842454910 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842466116 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842474937 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842489004 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842509031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842509985 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842533112 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842542887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842547894 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842554092 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842577934 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842587948 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842596054 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842605114 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842616081 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842618942 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842633963 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842652082 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842659950 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842669964 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842684984 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842694044 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842701912 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842737913 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842766047 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842777014 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842787981 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842811108 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842812061 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842833996 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842853069 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842914104 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842924118 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842931032 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842953920 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842962980 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842964888 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842981100 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.842998028 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.842998981 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843008995 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843019009 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843028069 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843029976 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843044996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843060970 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843066931 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843080044 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843087912 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843097925 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843099117 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843127012 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843137980 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843151093 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843159914 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843199968 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843209982 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843219995 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843239069 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843249083 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843257904 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843283892 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843292952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843301058 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843331099 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843349934 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843358994 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843389034 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843394995 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843398094 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843426943 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843436003 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843453884 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843478918 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843491077 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843504906 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843533039 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843544006 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843553066 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843559980 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843564034 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843588114 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843606949 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843621969 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843631029 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843637943 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843647003 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843674898 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843681097 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843689919 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843694925 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843698025 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843717098 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843719959 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843727112 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843734980 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843743086 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843743086 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843790054 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843811989 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843822956 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843831062 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843835115 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843852043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843861103 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843863010 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843868971 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843879938 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843894958 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843914986 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843920946 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843935966 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.843969107 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.843991995 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844070911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844080925 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844089031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844109058 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844118118 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844124079 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844125986 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844136000 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844136000 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844146013 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844163895 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844175100 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844177008 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844183922 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844192982 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844193935 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844211102 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844227076 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844234943 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.844240904 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844258070 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.844302893 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.845984936 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846035004 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846049070 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846059084 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846066952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846091986 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846112967 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846126080 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846136093 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846191883 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846194983 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846204996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846215010 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846240044 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846256018 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846256018 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846266031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846313953 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846415043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846425056 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846462965 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846466064 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846476078 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846483946 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846487045 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846497059 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846515894 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846518993 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846534967 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846544027 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846545935 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846553087 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846556902 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846585989 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846590996 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846596956 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846606970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846616030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846636057 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846648932 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846658945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846673965 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846692085 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846702099 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846704006 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846715927 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846719980 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846734047 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846749067 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846771955 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846793890 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846795082 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846805096 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846816063 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846841097 CEST497022227192.168.2.7185.244.212.106
                      Jul 30, 2024 07:24:54.846887112 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846899986 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846910954 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846929073 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846937895 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846963882 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.846972942 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847045898 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847064972 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847074032 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847084045 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847196102 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847206116 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847214937 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847235918 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847244978 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847260952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847270012 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847274065 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847294092 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847304106 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847374916 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847384930 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847410917 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847446918 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847460032 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847553015 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847563028 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847580910 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847589970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847599030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847631931 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847641945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847651005 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847729921 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847757101 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847780943 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847790003 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847809076 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847819090 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847827911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847899914 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847929001 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847960949 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847970009 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847979069 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.847982883 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848027945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848045111 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848054886 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848066092 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848170042 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848179102 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848223925 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848233938 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848275900 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848285913 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848352909 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848362923 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848381996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848392010 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848445892 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848455906 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848469973 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848494053 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848550081 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848560095 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848592043 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848670959 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848680019 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848690987 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848709106 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848721981 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848777056 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848787069 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848850012 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848859072 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848886967 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848908901 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848975897 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.848985910 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849041939 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849050999 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849069118 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849077940 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849176884 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849184990 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849195004 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849204063 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849220991 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849230051 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849240065 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849298000 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849349022 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849359989 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849416971 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849426985 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849446058 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849455118 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849490881 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849582911 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849591970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849608898 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849618912 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849627972 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849644899 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849653006 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849713087 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849721909 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849767923 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849777937 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849833965 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849843979 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849895000 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849904060 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849925041 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849946976 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849965096 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.849973917 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850024939 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850034952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850080013 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850090981 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850107908 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850136042 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850198030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850209951 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850231886 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850241899 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850303888 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850313902 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850361109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850389957 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850409031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850434065 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850469112 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850478888 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850528955 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850538969 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850549936 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850563049 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850620985 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850630045 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850760937 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850770950 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850790024 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850799084 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850806952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850816011 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850867987 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850889921 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850924015 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850933075 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850944042 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.850960970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851048946 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851098061 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851118088 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851126909 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851176023 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851183891 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851246119 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851255894 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851274014 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851283073 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851370096 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851378918 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851394892 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851403952 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851469040 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851478100 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851490021 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851500034 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851589918 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851602077 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851620913 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851629019 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851687908 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851699114 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851706982 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851716042 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851725101 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851746082 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851757050 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851766109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851874113 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851883888 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851891994 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851900101 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851917028 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851927042 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851965904 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.851974964 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852027893 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852036953 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852058887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852077961 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852139950 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852159977 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852170944 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852232933 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852277994 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852287054 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852324009 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852334023 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852377892 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852386951 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852446079 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852454901 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852494955 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852505922 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852540970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852550030 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852596045 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852605104 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852652073 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852662086 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852705002 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852714062 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852751970 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852761984 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852814913 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852823973 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852849007 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852859020 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852895975 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852905035 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852963924 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.852972031 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853005886 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853014946 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853046894 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853056908 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853171110 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853180885 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853189945 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853200912 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853216887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853225946 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853277922 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853286982 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853337049 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853347063 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853367090 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853399992 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853442907 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853452921 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853499889 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853508949 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853548050 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853593111 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853602886 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853724957 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853734016 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853743076 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853748083 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853755951 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853765965 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853827953 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853837967 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853844881 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853853941 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853873968 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853883028 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853890896 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853960991 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853970051 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853977919 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853986979 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.853996038 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854003906 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854012012 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854090929 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854099989 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854109049 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854118109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854126930 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854135036 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854202032 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854212046 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854219913 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854228973 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854238033 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854280949 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854290009 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854298115 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854307890 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854315996 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854325056 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854403019 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854413033 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854420900 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854429960 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854439020 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854448080 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854456902 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854475975 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854587078 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854597092 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854604959 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854613066 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854621887 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854630947 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854639053 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854648113 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854705095 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854715109 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854723930 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854732990 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854741096 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854749918 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854808092 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854818106 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.854825974 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:54.902169943 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:55.176039934 CEST222749702185.244.212.106192.168.2.7
                      Jul 30, 2024 07:24:55.176151991 CEST497022227192.168.2.7185.244.212.106

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:01:24:44
                      Start date:30/07/2024
                      Path:C:\Users\user\Desktop\F7fahhucBo.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\F7fahhucBo.exe"
                      Imagebase:0x830000
                      File size:92'160 bytes
                      MD5 hash:AC83EE8E909F55B86251B145CFA42C66
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.1265265580.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:2
                      Start time:01:24:44
                      Start date:30/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                      Imagebase:0xad0000
                      File size:108'664 bytes
                      MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:31.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:17.1%
                        Total number of Nodes:41
                        Total number of Limit Nodes:2
                        execution_graph 1146 29208a8 1147 29208b3 1146->1147 1150 29219c0 1147->1150 1152 29219fd 1150->1152 1151 292091c 1152->1151 1159 29213c0 WriteProcessMemory 1152->1159 1160 29213b9 WriteProcessMemory 1152->1160 1161 2921221 Wow64SetThreadContext 1152->1161 1162 2921228 Wow64SetThreadContext 1152->1162 1165 2921648 1152->1165 1169 292163c 1152->1169 1173 29214b0 1152->1173 1177 29214ae 1152->1177 1181 29212f9 1152->1181 1185 2921300 1152->1185 1189 2921178 1152->1189 1193 2921170 1152->1193 1159->1152 1160->1152 1161->1152 1162->1152 1166 29216d1 1165->1166 1166->1166 1167 2921836 CreateProcessA 1166->1167 1168 2921893 1167->1168 1170 29216d1 1169->1170 1170->1170 1171 2921836 CreateProcessA 1170->1171 1172 2921893 1171->1172 1174 29214fb ReadProcessMemory 1173->1174 1176 292153f 1174->1176 1176->1152 1178 29214b0 ReadProcessMemory 1177->1178 1180 292153f 1178->1180 1180->1152 1182 2921300 VirtualAllocEx 1181->1182 1184 292137d 1182->1184 1184->1152 1186 2921340 VirtualAllocEx 1185->1186 1188 292137d 1186->1188 1188->1152 1190 29211b8 ResumeThread 1189->1190 1192 29211e9 1190->1192 1192->1152 1195 2921177 1193->1195 1194 2921157 1194->1152 1195->1194 1196 29211c2 ResumeThread 1195->1196 1197 29211e9 1196->1197 1197->1152 1198 2920898 1199 29208a8 1198->1199 1201 29219c0 12 API calls 1199->1201 1200 292091c 1201->1200

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 120 29219c0-29219fa 121 29219fd-2921a77 120->121 243 2921a7a call 2921648 121->243 244 2921a7a call 292163c 121->244 125 2921a7c-2921a7e 126 2921a84-2921ac4 125->126 127 292200c-292201f 125->127 132 2922026-2922050 call 29207ec 126->132 134 2921aca-2921ade 126->134 127->132 132->121 155 2922056-292205d 132->155 253 2921ae1 call 2921221 134->253 254 2921ae1 call 2921228 134->254 136 2921ae3-2921ae5 137 2921ff2-2922005 136->137 138 2921aeb-2921af5 136->138 137->127 138->132 140 2921afb-2921b23 138->140 241 2921b26 call 29214b0 140->241 242 2921b26 call 29214ae 140->242 143 2921b28-2921b2a 145 2921b30-2921b33 143->145 146 2921fd8-2921feb 143->146 149 2921b51-2921b8e 145->149 150 2921b35-2921b4b 145->150 146->137 239 2921b91 call 2921300 149->239 240 2921b91 call 29212f9 149->240 150->149 157 2921fbe-2921fd1 150->157 157->146 160 2921b93-2921b98 162 2921fa4-2921fb7 160->162 163 2921b9e-2921bb8 160->163 162->157 245 2921bbb call 29213c0 163->245 246 2921bbb call 29213b9 163->246 164 2921bbd-2921bbf 166 2921bc5-2921bea 164->166 167 2921f8a-2921f9d 164->167 171 2921bf0-2921c63 166->171 172 2921e91-2921eb6 166->172 167->162 197 2921c71-2921cea 171->197 198 2921c65-2921c67 171->198 237 2921eb9 call 29213c0 172->237 238 2921eb9 call 29213b9 172->238 177 2921ebb-2921ebd 178 2921ec3-2921ee6 177->178 179 2921f56-2921f69 177->179 178->132 184 2921eec-2921eff 178->184 190 2921f70-2921f83 179->190 247 2921f02 call 2921221 184->247 248 2921f02 call 2921228 184->248 186 2921f04-2921f06 188 2921f08-2921f14 186->188 189 2921f3c-2921f4f 186->189 251 2921f17 call 2921170 188->251 252 2921f17 call 2921178 188->252 189->179 190->167 192 2921f19-2921f1c 192->155 196 2921f22-2921f35 192->196 196->189 210 2921cf8-2921d71 197->210 211 2921cec-2921cee 197->211 198->197 219 2921d73-2921d75 210->219 220 2921d7f-2921d89 210->220 211->210 219->220 221 2921e7f-2921e8b 220->221 222 2921d8f-2921e72 220->222 221->171 221->172 249 2921e75 call 29213c0 222->249 250 2921e75 call 29213b9 222->250 236 2921e77-2921e79 236->190 236->221 237->177 238->177 239->160 240->160 241->143 242->143 243->125 244->125 245->164 246->164 247->186 248->186 249->236 250->236 251->192 252->192 253->136 254->136
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID:
                        • String ID: <-q
                        • API String ID: 0-3445421276
                        • Opcode ID: 20da0d8a0a552c8b15ac2745a0411ead1671992031dd726dcaee847cc63a6316
                        • Instruction ID: b06e1ccd0a7886935f832179073008127b7c54c89a6a98f139f1fc5410f56f6c
                        • Opcode Fuzzy Hash: 20da0d8a0a552c8b15ac2745a0411ead1671992031dd726dcaee847cc63a6316
                        • Instruction Fuzzy Hash: DE025030B006159FDB18DB69D854B6DBBB6FFC8210F24C168D81AAB399DF319C46CB94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 292163c-29216dd 2 2921716-2921736 0->2 3 29216df-29216e9 0->3 10 2921738-2921742 2->10 11 292176f-292179e 2->11 3->2 4 29216eb-29216ed 3->4 5 2921710-2921713 4->5 6 29216ef-29216f9 4->6 5->2 8 29216fb 6->8 9 29216fd-292170c 6->9 8->9 9->9 12 292170e 9->12 10->11 13 2921744-2921746 10->13 17 29217a0-29217aa 11->17 18 29217d7-2921891 CreateProcessA 11->18 12->5 15 2921748-2921752 13->15 16 2921769-292176c 13->16 19 2921756-2921765 15->19 20 2921754 15->20 16->11 17->18 21 29217ac-29217ae 17->21 31 2921893-2921899 18->31 32 292189a-2921920 18->32 19->19 22 2921767 19->22 20->19 23 29217b0-29217ba 21->23 24 29217d1-29217d4 21->24 22->16 26 29217be-29217cd 23->26 27 29217bc 23->27 24->18 26->26 28 29217cf 26->28 27->26 28->24 31->32 42 2921922-2921926 32->42 43 2921930-2921934 32->43 42->43 44 2921928-292192b call 2920254 42->44 45 2921936-292193a 43->45 46 2921944-2921948 43->46 44->43 45->46 48 292193c-292193f call 2920254 45->48 49 292194a-292194e 46->49 50 2921958-292195c 46->50 48->46 49->50 51 2921950-2921953 call 2920254 49->51 52 292196e-2921975 50->52 53 292195e-2921964 50->53 51->50 56 2921977-2921986 52->56 57 292198c 52->57 53->52 56->57 59 292198d 57->59 59->59
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0292187E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 74f04f224feb1adb4ea93e7864faf82f628246e92f1af82b0696bd91d492f97d
                        • Instruction ID: 2c3c767f56543c862818d3b083c6c4e1d0d26f8baa394cb0fc8245386e075ac4
                        • Opcode Fuzzy Hash: 74f04f224feb1adb4ea93e7864faf82f628246e92f1af82b0696bd91d492f97d
                        • Instruction Fuzzy Hash: C7A17A71D003698FEF24CF68C840BEDBBB6BF48314F1481A9E848A7245DB749999CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 60 2921648-29216dd 62 2921716-2921736 60->62 63 29216df-29216e9 60->63 70 2921738-2921742 62->70 71 292176f-292179e 62->71 63->62 64 29216eb-29216ed 63->64 65 2921710-2921713 64->65 66 29216ef-29216f9 64->66 65->62 68 29216fb 66->68 69 29216fd-292170c 66->69 68->69 69->69 72 292170e 69->72 70->71 73 2921744-2921746 70->73 77 29217a0-29217aa 71->77 78 29217d7-2921891 CreateProcessA 71->78 72->65 75 2921748-2921752 73->75 76 2921769-292176c 73->76 79 2921756-2921765 75->79 80 2921754 75->80 76->71 77->78 81 29217ac-29217ae 77->81 91 2921893-2921899 78->91 92 292189a-2921920 78->92 79->79 82 2921767 79->82 80->79 83 29217b0-29217ba 81->83 84 29217d1-29217d4 81->84 82->76 86 29217be-29217cd 83->86 87 29217bc 83->87 84->78 86->86 88 29217cf 86->88 87->86 88->84 91->92 102 2921922-2921926 92->102 103 2921930-2921934 92->103 102->103 104 2921928-292192b call 2920254 102->104 105 2921936-292193a 103->105 106 2921944-2921948 103->106 104->103 105->106 108 292193c-292193f call 2920254 105->108 109 292194a-292194e 106->109 110 2921958-292195c 106->110 108->106 109->110 111 2921950-2921953 call 2920254 109->111 112 292196e-2921975 110->112 113 292195e-2921964 110->113 111->110 116 2921977-2921986 112->116 117 292198c 112->117 113->112 116->117 119 292198d 117->119 119->119
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0292187E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: e45666b620e40fb230458e5cba1c90bfb260d5dbda0b767185fe0eea967ff020
                        • Instruction ID: 3713555eea28be1257b61cc8b147be18b05b3b9b52fd32581ef7397b4dce9e6e
                        • Opcode Fuzzy Hash: e45666b620e40fb230458e5cba1c90bfb260d5dbda0b767185fe0eea967ff020
                        • Instruction Fuzzy Hash: AE915A71D003298FEF24DF69C841BEDBBB6BB48314F148169E808A7245DB749999CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 255 2921221-2921224 256 2921226-2921261 255->256 257 2921299 255->257 259 2921263-2921273 256->259 257->259 260 292129b-29212b3 Wow64SetThreadContext 257->260 265 2921283-2921298 259->265 266 2921275-2921281 259->266 261 29212b5-29212bb 260->261 262 29212bc-29212ec 260->262 261->262 265->257 266->265
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 029212A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: 76bb73343826684c623092907940f39b32e03da56c148857d4715e2e493a1db7
                        • Instruction ID: 2276998f25aa0660cfe4ca4eeb2cfbddd4416be786f855472176d4b10b9869f5
                        • Opcode Fuzzy Hash: 76bb73343826684c623092907940f39b32e03da56c148857d4715e2e493a1db7
                        • Instruction Fuzzy Hash: D8217C75D003488FDB10DFAAC4817EEBFF5AF49224F14842EE458A7241D7799945CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 270 29213b9-292140e 273 2921410-292141c 270->273 274 292141e-292145d WriteProcessMemory 270->274 273->274 276 2921466-2921496 274->276 277 292145f-2921465 274->277 277->276
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02921450
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: a5597c1f8855207a4ad0decddc151771cc0f0abe358cec48c3dafa68f77e9c13
                        • Instruction ID: d2713349102e9f82683014811880d09f4c94593c79d7389436dda687bff86a03
                        • Opcode Fuzzy Hash: a5597c1f8855207a4ad0decddc151771cc0f0abe358cec48c3dafa68f77e9c13
                        • Instruction Fuzzy Hash: 3E213371D003599FDB10CFAAC881BEEBBF5FF48310F50842AE958A7241C7799955CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 281 29213c0-292140e 283 2921410-292141c 281->283 284 292141e-292145d WriteProcessMemory 281->284 283->284 286 2921466-2921496 284->286 287 292145f-2921465 284->287 287->286
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02921450
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 1eed7bfbcba703ffe3c24c52f7688e83a0876a20f95b9a1a7549be1ac1aee0ba
                        • Instruction ID: 34fe9af0c6ffc7222c6ec2892a212b6207b30e126077541690e84db315961ef8
                        • Opcode Fuzzy Hash: 1eed7bfbcba703ffe3c24c52f7688e83a0876a20f95b9a1a7549be1ac1aee0ba
                        • Instruction Fuzzy Hash: 90212375D003599FDB20DFAAC881BEEBBF5FF48310F50842AE918A7241C7789954CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 291 2921170-2921174 292 2921177-2921188 291->292 293 2921189-292118e 291->293 292->293 294 2921157-2921161 293->294 295 292118f-29211e7 ResumeThread 293->295 298 29211f0-2921215 295->298 299 29211e9-29211ef 295->299 299->298
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 14cd8ea62f2e2b984ff816fb609095ca0ec319fbd6bd2b8035a93b730e9a0f23
                        • Instruction ID: aeff377d0f6885bb402a4cec47c47f21969600f9403952f392dd55f31d735040
                        • Opcode Fuzzy Hash: 14cd8ea62f2e2b984ff816fb609095ca0ec319fbd6bd2b8035a93b730e9a0f23
                        • Instruction Fuzzy Hash: 7F21A975D003598FCB20DFAAD445BEEFBF4EB88224F20885AD829A7601CB356805CF94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 303 29214ae-292153d ReadProcessMemory 307 2921546-2921576 303->307 308 292153f-2921545 303->308 308->307
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02921530
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 3ae77e0f865dfad75e21ced13be52d70d0e3b7bfeb1f0426301d2f8b184b2e6a
                        • Instruction ID: 1f7b853008ca40b6ccee50f7fd58facdd605c256b0cc56bd4f04bac230b14d1f
                        • Opcode Fuzzy Hash: 3ae77e0f865dfad75e21ced13be52d70d0e3b7bfeb1f0426301d2f8b184b2e6a
                        • Instruction Fuzzy Hash: E0211471D003599FDB10DFAAC881BEEBBF5FF48320F50842AE959A7251C7399905CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 326 29214b0-292153d ReadProcessMemory 329 2921546-2921576 326->329 330 292153f-2921545 326->330 330->329
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02921530
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: c3aca147e415276864efff60f05187c07aae97bcd933740c8f00b87c9a59cabb
                        • Instruction ID: e310f17bac3e425ceab15babea69b1ab448e70c743b0b635861c4862213b47e1
                        • Opcode Fuzzy Hash: c3aca147e415276864efff60f05187c07aae97bcd933740c8f00b87c9a59cabb
                        • Instruction Fuzzy Hash: E7212571D003599FDB10DFAAC881BEEBBF5FF48310F50842AE919A7240C7399905CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 313 2921228-2921261 314 2921263-2921273 313->314 316 2921283-2921299 314->316 317 2921275-2921281 314->317 316->314 320 292129b-29212b3 Wow64SetThreadContext 316->320 317->316 321 29212b5-29212bb 320->321 322 29212bc-29212ec 320->322 321->322
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 029212A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: d6f167a65bc8feb8e8dabd5f9168260dcfde6fb94c558e095cc302727f402254
                        • Instruction ID: ffb21324cf94c361e26174ea59eaef081aa6f51870edf46421b0cafc6b784586
                        • Opcode Fuzzy Hash: d6f167a65bc8feb8e8dabd5f9168260dcfde6fb94c558e095cc302727f402254
                        • Instruction Fuzzy Hash: F5213871D003098FDB10DFAAC485BAEBBF4EF48314F54842EE819A7241CB789945CFA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 335 29212f9-292137b VirtualAllocEx 339 2921384-29213a9 335->339 340 292137d-2921383 335->340 340->339
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0292136E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 5bb8d5796f55bb773e86552aabf61065fe00e1a7134e11b1896f52fa712a2b3e
                        • Instruction ID: 6b3c9d0575b3fafde1d06f3bcc404aa38a59cdeb0a5e379821bb459ad7b8ae1e
                        • Opcode Fuzzy Hash: 5bb8d5796f55bb773e86552aabf61065fe00e1a7134e11b1896f52fa712a2b3e
                        • Instruction Fuzzy Hash: 7D1164718003498FCB20DFAAC845BDEBFF5AF48320F14841AE919A7251CB76A900CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 344 2921300-292137b VirtualAllocEx 347 2921384-29213a9 344->347 348 292137d-2921383 344->348 348->347
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0292136E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 4a55a8700c27d819c4ad4750580a22dffd9166f8fc8078e9db36a04a56860b03
                        • Instruction ID: a8c7b64c822b154a444039d352951b2348f966b4ea034e65a808069bac732e29
                        • Opcode Fuzzy Hash: 4a55a8700c27d819c4ad4750580a22dffd9166f8fc8078e9db36a04a56860b03
                        • Instruction Fuzzy Hash: 76115371D003098FDF20DFAAC845BDEBBF5EB48320F10841AE919A7250CB39A900CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 352 2921178-29211e7 ResumeThread 355 29211f0-2921215 352->355 356 29211e9-29211ef 352->356 356->355
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265183377.0000000002920000.00000040.00000800.00020000.00000000.sdmp, Offset: 02920000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2920000_F7fahhucBo.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 526d95c01ac8eb233d2f2e5a3b1e860bf7076bb4685105d286cb77522129b4e1
                        • Instruction ID: 2545e71e3d7c609e26b433e4cf49eeaedde20efc1429ab329c550def309032ea
                        • Opcode Fuzzy Hash: 526d95c01ac8eb233d2f2e5a3b1e860bf7076bb4685105d286cb77522129b4e1
                        • Instruction Fuzzy Hash: 07116671D003098FDB24DFAAC845B9EFBF5EB88320F20841ED419A7240CB39A905CFA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265037175.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_111d000_F7fahhucBo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 03af2819adca0762a8b56e680145f1a67341e33ee732ae28a1371523f64f740b
                        • Instruction ID: 9fbf8e4f92fbf10c25afb9a5c4b315fa990cad8aa0cfb26fa436f4210dca6988
                        • Opcode Fuzzy Hash: 03af2819adca0762a8b56e680145f1a67341e33ee732ae28a1371523f64f740b
                        • Instruction Fuzzy Hash: 4F2103B1544200DFDF19DF94E9C8B56FF65FB88324F20C579E8090BA4AC336E456CAA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1265037175.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_111d000_F7fahhucBo.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                        • Instruction ID: 010f0509a7b7df8bfb339a304ed0f3ec463b0b23269fad813d3355192f63a689
                        • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                        • Instruction Fuzzy Hash: 14119D76544280CFCF1ACF54D5C4B56BF72FB84324F24C5A9D8490BA5AC336E456CBA1

                        Execution Graph

                        Execution Coverage:27.7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:29.1%
                        Total number of Nodes:382
                        Total number of Limit Nodes:8
                        execution_graph 2310 402282 InitializeCriticalSectionAndSpinCount 2311 4022a1 2310->2311 2312 4022a6 CreateMutexA 2310->2312 2313 4022c2 GetLastError 2312->2313 2314 402705 ExitProcess 2312->2314 2313->2314 2315 4022d3 2313->2315 2388 403c5f 2315->2388 2317 4026dc DeleteCriticalSection 2317->2314 2318 4022de 2318->2317 2392 404871 2318->2392 2321 4026d4 2323 4035c3 2 API calls 2321->2323 2323->2317 2328 40236d 2415 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2328->2415 2330 40237c 2416 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2330->2416 2332 40266c 2481 403e03 EnterCriticalSection 2332->2481 2334 40238b 2334->2332 2417 40475f GetModuleHandleA 2334->2417 2335 402685 2494 4035c3 2335->2494 2338 4023ed 2338->2332 2420 401fba GetUserDefaultUILanguage 2338->2420 2340 4035c3 2 API calls 2342 40269d 2340->2342 2344 4035c3 2 API calls 2342->2344 2346 4026a8 2344->2346 2345 402441 2345->2311 2349 40246a ExitProcess 2345->2349 2352 402472 2345->2352 2348 4035c3 2 API calls 2346->2348 2347 40475f 2 API calls 2347->2345 2350 4026b3 2348->2350 2350->2321 2497 4053f8 2350->2497 2353 40249f ExitProcess 2352->2353 2354 4024a7 2352->2354 2355 4024d4 ExitProcess 2354->2355 2356 4024dc 2354->2356 2431 404c2d 2356->2431 2364 4025bf 2511 4052c4 2364->2511 2365 4025ac 2366 403668 11 API calls 2365->2366 2366->2364 2368 4025d0 2369 4052c4 4 API calls 2368->2369 2370 4025de 2369->2370 2371 4052c4 4 API calls 2370->2371 2372 4025ee 2371->2372 2373 4052c4 4 API calls 2372->2373 2374 4025fd 2373->2374 2375 4052c4 4 API calls 2374->2375 2376 40260d 2375->2376 2377 4052c4 4 API calls 2376->2377 2378 40261c 2377->2378 2515 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2378->2515 2380 402626 2381 40262f GetModuleFileNameW 2380->2381 2382 40263f 2380->2382 2381->2382 2383 4052c4 4 API calls 2382->2383 2384 402659 2383->2384 2385 4052c4 4 API calls 2384->2385 2386 402664 2385->2386 2387 4035c3 2 API calls 2386->2387 2387->2332 2389 403c67 2388->2389 2516 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2389->2516 2391 403c72 2391->2318 2393 40475f 2 API calls 2392->2393 2395 40489d 2393->2395 2394 402310 2394->2321 2401 403668 2394->2401 2395->2394 2396 4052c4 4 API calls 2395->2396 2397 4048b3 2396->2397 2398 4052c4 4 API calls 2397->2398 2399 4048be 2398->2399 2400 4052c4 4 API calls 2399->2400 2400->2394 2517 402c95 2401->2517 2404 4048d6 2405 4048eb VirtualAlloc 2404->2405 2408 402351 2404->2408 2406 40490a 2405->2406 2405->2408 2407 40475f 2 API calls 2406->2407 2409 40492c 2407->2409 2408->2321 2414 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2408->2414 2409->2408 2410 40495b GetCurrentProcess IsWow64Process 2409->2410 2412 4052c4 4 API calls 2410->2412 2413 404985 2412->2413 2413->2408 2414->2328 2415->2330 2416->2334 2418 40477d LoadLibraryA 2417->2418 2419 40478a 2417->2419 2418->2419 2419->2338 2421 40202d 2420->2421 2422 403668 11 API calls 2421->2422 2423 402065 2422->2423 2424 403668 11 API calls 2423->2424 2425 402074 GetKeyboardLayoutList 2424->2425 2426 4020cf 2425->2426 2430 40208e 2425->2430 2427 403668 11 API calls 2426->2427 2428 4020db 2427->2428 2428->2345 2428->2347 2429 403668 11 API calls 2429->2430 2430->2426 2430->2429 2432 404c43 2431->2432 2433 4024f5 CreateThread CreateThread WaitForMultipleObjects 2431->2433 2434 40475f 2 API calls 2432->2434 2458 401a6c 2433->2458 2741 401dc9 2433->2741 2757 40522a 2433->2757 2435 404c74 2434->2435 2435->2433 2436 40475f 2 API calls 2435->2436 2437 404c89 2436->2437 2437->2433 2438 404c91 KiUserCallbackDispatcher GetSystemMetrics 2437->2438 2439 404cb6 2438->2439 2440 404cdc GetDC 2439->2440 2440->2433 2441 404cf0 GetCurrentObject 2440->2441 2442 404ea2 ReleaseDC 2441->2442 2443 404d03 GetObjectW 2441->2443 2442->2433 2443->2442 2444 404d1a 2443->2444 2445 403668 11 API calls 2444->2445 2446 404d3a DeleteObject CreateCompatibleDC 2445->2446 2446->2442 2447 404daf CreateDIBSection 2446->2447 2448 404dd0 SelectObject 2447->2448 2449 404e9b DeleteDC 2447->2449 2450 404de0 BitBlt 2448->2450 2451 404e94 DeleteObject 2448->2451 2449->2442 2450->2451 2452 404e05 2450->2452 2451->2449 2545 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2452->2545 2454 404e10 2454->2451 2455 403e03 10 API calls 2454->2455 2456 404e89 2455->2456 2457 4035c3 2 API calls 2456->2457 2457->2451 2459 401a7a 2458->2459 2463 401ab3 2458->2463 2461 401a96 2459->2461 2546 401000 2459->2546 2462 401000 57 API calls 2461->2462 2461->2463 2462->2463 2464 4020e1 2463->2464 2724 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2464->2724 2466 402106 2467 402190 GetCurrentHwProfileA 2466->2467 2468 4021a4 2467->2468 2469 4021ba GetSystemInfo 2467->2469 2470 403668 11 API calls 2468->2470 2471 403668 11 API calls 2469->2471 2472 4021b7 2470->2472 2473 4021dc 2471->2473 2472->2469 2474 4035c3 2 API calls 2473->2474 2475 4021e6 GlobalMemoryStatusEx 2474->2475 2476 403668 11 API calls 2475->2476 2479 402215 2476->2479 2477 402268 EnumDisplayDevicesA 2478 40227b ObtainUserAgentString 2477->2478 2477->2479 2478->2364 2478->2365 2479->2477 2480 403668 11 API calls 2479->2480 2480->2479 2482 403f31 LeaveCriticalSection 2481->2482 2483 403e25 2481->2483 2482->2335 2483->2482 2725 403da9 WideCharToMultiByte 2483->2725 2487 403e79 2732 406d0e 2487->2732 2489 403e83 2490 4035c3 2 API calls 2489->2490 2491 403edc 2490->2491 2492 4035c3 2 API calls 2491->2492 2493 403f2c 2492->2493 2493->2482 2495 402692 2494->2495 2496 4035c7 GetProcessHeap RtlFreeHeap 2494->2496 2495->2340 2496->2495 2498 40475f 2 API calls 2497->2498 2499 40547b 2498->2499 2500 4054fc socket 2499->2500 2501 405483 2499->2501 2500->2501 2502 405520 2500->2502 2501->2350 2503 405540 connect 2502->2503 2504 4055b3 closesocket 2502->2504 2505 4055a6 Sleep 2503->2505 2506 405557 send 2503->2506 2504->2501 2505->2502 2506->2505 2507 405579 send 2506->2507 2507->2505 2508 405595 2507->2508 2509 4035c3 2 API calls 2508->2509 2510 4055a0 2509->2510 2510->2504 2513 4052e7 2511->2513 2514 405313 2511->2514 2513->2514 2740 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2513->2740 2514->2368 2515->2380 2516->2391 2518 402ca5 2517->2518 2528 402cb3 2517->2528 2529 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2518->2529 2520 402d03 2521 402336 2520->2521 2540 405281 2520->2540 2521->2404 2523 4030c3 2524 4035c3 2 API calls 2523->2524 2524->2521 2526 402eb6 WideCharToMultiByte 2526->2528 2527 402f3e WideCharToMultiByte 2527->2528 2528->2520 2528->2526 2528->2527 2530 402a1e 2528->2530 2529->2528 2531 402a36 2530->2531 2532 402c71 2531->2532 2533 402a5d 2531->2533 2535 402a6f __aulldvrm 2531->2535 2534 402c77 WideCharToMultiByte 2532->2534 2532->2535 2536 402a66 2533->2536 2537 402c0a 2533->2537 2534->2535 2535->2528 2536->2535 2539 402bd2 WideCharToMultiByte 2536->2539 2537->2535 2538 402c32 IsDBCSLeadByte 2537->2538 2538->2537 2539->2536 2541 40529c 2540->2541 2542 405292 2540->2542 2541->2523 2544 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2542->2544 2544->2541 2545->2454 2547 40141c 2546->2547 2548 40101e 2546->2548 2547->2461 2548->2547 2583 404108 GetFileAttributesW 2548->2583 2550 401035 2550->2547 2584 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2550->2584 2552 401049 2585 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2552->2585 2554 401052 2560 4013df 2554->2560 2586 40368d 2554->2586 2555 4035c3 2 API calls 2557 401415 2555->2557 2559 4035c3 2 API calls 2557->2559 2559->2547 2560->2555 2561 4013c7 FindNextFileW 2561->2560 2564 401173 2561->2564 2562 40368d 7 API calls 2562->2564 2564->2561 2564->2562 2565 403f43 41 API calls 2564->2565 2571 4016ef EnterCriticalSection 2564->2571 2575 403e03 10 API calls 2564->2575 2576 4035c3 GetProcessHeap RtlFreeHeap 2564->2576 2578 40134d 2564->2578 2582 401000 53 API calls 2564->2582 2589 4044f7 2564->2589 2621 403729 2564->2621 2625 401aef 2564->2625 2633 401d21 2564->2633 2640 401c32 2564->2640 2677 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2564->2677 2565->2564 2570 404145 15 API calls 2570->2578 2651 404eb2 2571->2651 2575->2564 2576->2564 2578->2564 2578->2570 2579 40368d 7 API calls 2578->2579 2580 403f87 43 API calls 2578->2580 2643 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2578->2643 2644 403f43 2578->2644 2579->2578 2580->2578 2582->2564 2583->2550 2584->2552 2585->2554 2678 403111 2586->2678 2686 404108 GetFileAttributesW 2589->2686 2591 404509 2592 404758 2591->2592 2687 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2591->2687 2592->2564 2594 40451f 2595 404750 2594->2595 2597 40368d 7 API calls 2594->2597 2596 4035c3 2 API calls 2595->2596 2596->2592 2598 40453c 2597->2598 2599 40455a EnterCriticalSection 2598->2599 2600 4045c4 LeaveCriticalSection 2599->2600 2601 404626 2600->2601 2602 4045dd 2600->2602 2601->2595 2603 404649 EnterCriticalSection 2601->2603 2602->2601 2604 4045fa 2602->2604 2606 404680 LeaveCriticalSection 2603->2606 2689 404377 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2604->2689 2608 404698 2606->2608 2609 40471c EnterCriticalSection 2606->2609 2688 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2608->2688 2613 404745 LeaveCriticalSection 2609->2613 2610 404603 2612 4035c3 2 API calls 2610->2612 2615 40460b 2612->2615 2613->2595 2614 4046a2 2614->2609 2618 4046bf EnterCriticalSection 2614->2618 2616 4044f7 29 API calls 2615->2616 2617 40461f 2616->2617 2617->2592 2619 404700 LeaveCriticalSection 2618->2619 2619->2609 2620 404714 2619->2620 2620->2609 2622 40373d 2621->2622 2624 403741 2622->2624 2710 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2622->2710 2624->2564 2626 401b07 2625->2626 2628 401b0c 2625->2628 2711 401aba 2626->2711 2631 401b11 2628->2631 2714 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2628->2714 2631->2564 2632 401b40 2632->2631 2715 401adc 2632->2715 2634 40475f 2 API calls 2633->2634 2635 401d5a 2634->2635 2636 401d6a CryptUnprotectData 2635->2636 2638 401d87 2635->2638 2637 401d92 2636->2637 2636->2638 2637->2638 2639 401d99 CryptProtectData 2637->2639 2638->2564 2639->2638 2719 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2640->2719 2642 401c58 2642->2564 2643->2578 2645 4044f7 37 API calls 2644->2645 2646 403f59 2645->2646 2647 403f78 2646->2647 2649 403e03 10 API calls 2646->2649 2648 4035c3 2 API calls 2647->2648 2650 403f81 2648->2650 2649->2647 2650->2578 2652 404f15 2651->2652 2653 404ed4 2651->2653 2661 40170b LeaveCriticalSection 2652->2661 2720 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2652->2720 2655 40368d 7 API calls 2653->2655 2657 404f0b 2655->2657 2656 404f35 2721 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2656->2721 2722 404108 GetFileAttributesW 2657->2722 2660 404f3f 2662 40368d 7 API calls 2660->2662 2661->2564 2663 404f4d FindFirstFileW 2662->2663 2664 40520e 2663->2664 2669 404f6a 2663->2669 2665 4035c3 2 API calls 2664->2665 2666 405215 2665->2666 2667 4035c3 2 API calls 2666->2667 2667->2661 2668 4051f6 FindNextFileW 2668->2664 2668->2669 2669->2668 2670 40500f EnterCriticalSection 2669->2670 2674 404eb2 41 API calls 2669->2674 2675 40368d 7 API calls 2669->2675 2676 403f43 41 API calls 2669->2676 2723 404108 GetFileAttributesW 2669->2723 2672 404eb2 41 API calls 2670->2672 2673 40502a LeaveCriticalSection 2672->2673 2673->2668 2674->2669 2675->2669 2676->2669 2677->2564 2684 40311d 2678->2684 2679 401156 FindFirstFileW 2679->2560 2679->2564 2680 402a1e 3 API calls 2680->2684 2681 40332a IsDBCSLeadByte 2682 403337 MultiByteToWideChar 2681->2682 2681->2684 2682->2684 2683 403395 IsDBCSLeadByte 2683->2684 2684->2679 2684->2680 2684->2681 2684->2683 2685 4033b6 MultiByteToWideChar 2684->2685 2685->2684 2686->2591 2687->2594 2688->2614 2690 4043bc 2689->2690 2691 4044ee 2689->2691 2690->2691 2703 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2690->2703 2691->2601 2691->2610 2693 4043d0 2700 404408 2693->2700 2704 4037f9 2693->2704 2694 4044d2 2696 4035c3 2 API calls 2694->2696 2696->2691 2697 40442a OpenProcess 2698 404440 GetCurrentProcess DuplicateHandle 2697->2698 2697->2700 2699 4044b7 CloseHandle 2698->2699 2698->2700 2699->2700 2700->2694 2700->2697 2700->2699 2701 404487 CloseHandle GetCurrentProcess DuplicateHandle 2700->2701 2702 4044d4 CloseHandle CloseHandle 2700->2702 2701->2699 2701->2700 2702->2694 2703->2693 2705 403803 2704->2705 2706 403810 2705->2706 2707 403819 GetProcessHeap HeapReAlloc 2705->2707 2708 4035c3 2 API calls 2706->2708 2707->2707 2709 403815 2707->2709 2708->2709 2709->2693 2710->2624 2718 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2711->2718 2713 401ac4 2713->2628 2714->2632 2716 4035c3 2 API calls 2715->2716 2717 401ae7 2716->2717 2717->2631 2718->2713 2719->2642 2720->2656 2721->2660 2722->2652 2723->2669 2724->2466 2726 403dd4 2725->2726 2727 403dfd 2725->2727 2735 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2726->2735 2727->2482 2731 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2727->2731 2729 403ddc 2729->2727 2730 403de2 WideCharToMultiByte 2729->2730 2730->2727 2731->2487 2736 406de8 2732->2736 2734 406d19 2734->2489 2735->2729 2739 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2736->2739 2738 406df0 2738->2734 2739->2738 2740->2513 2742 401de1 2741->2742 2743 401fb2 2741->2743 2742->2743 2744 40368d 7 API calls 2742->2744 2745 401e02 FindFirstFileW 2744->2745 2745->2743 2746 401e21 2745->2746 2765 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2746->2765 2748 401f8e FindNextFileW 2749 401fa9 2748->2749 2755 401e2b 2748->2755 2750 4035c3 2 API calls 2749->2750 2750->2743 2752 4035c3 2 API calls 2752->2755 2753 401dc9 41 API calls 2753->2755 2754 40368d 7 API calls 2754->2755 2755->2748 2755->2752 2755->2753 2755->2754 2756 403f43 41 API calls 2755->2756 2766 404118 2755->2766 2756->2755 2758 405238 2757->2758 2759 405279 2757->2759 2776 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2758->2776 2761 404eb2 45 API calls 2762 405242 2761->2762 2762->2761 2763 405272 2762->2763 2764 4035c3 2 API calls 2763->2764 2764->2759 2765->2755 2768 404120 2766->2768 2767 404132 2767->2755 2768->2767 2771 4036e4 2768->2771 2772 4036f8 2771->2772 2774 4036fc 2772->2774 2775 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 2772->2775 2774->2755 2775->2774 2776->2762

                        Control-flow Graph

                        APIs
                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                        • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 00404C9E
                        • GetSystemMetrics.USER32(0000004D), ref: 00404CA5
                        • GetDC.USER32(00000000), ref: 00404CE0
                        • GetCurrentObject.GDI32(00000000,00000007), ref: 00404CF3
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00404D0C
                        • DeleteObject.GDI32(00000000), ref: 00404D3E
                        • CreateCompatibleDC.GDI32(00000000), ref: 00404D9F
                        • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 00404DC0
                        • SelectObject.GDI32(00000000,00000000), ref: 00404DD2
                        • BitBlt.GDI32(00000000,00000000,00000000,?,004024F5,00000000,?,?,00CC0020), ref: 00404DF7
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                          • Part of subcall function 00403E03: EnterCriticalSection.KERNEL32(004084D4,?,0000011C), ref: 00403E15
                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                        • DeleteObject.GDI32(00000000), ref: 00404E95
                        • DeleteDC.GDI32(00000000), ref: 00404E9C
                        • ReleaseDC.USER32(00000000,00000000), ref: 00404EA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                        • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                        • API String ID: 1387450592-1028866296
                        • Opcode ID: 54111a4b7bc319f5745368608b5675afeea82435c2ec2d0b094c19900ce30ce6
                        • Instruction ID: 6b3ee7ab4da137d1a309b5a9f787d899f0e5564c39ac921fb92ff6ff8e554c30
                        • Opcode Fuzzy Hash: 54111a4b7bc319f5745368608b5675afeea82435c2ec2d0b094c19900ce30ce6
                        • Instruction Fuzzy Hash: 4B718075D00208ABDB20DFA5DD45BEEBB79AF44700F10446AE605B72D1DB785A04CBA9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 156 401000-401018 157 40141c-401422 156->157 158 40101e-401028 156->158 158->157 159 40102e-401037 call 404108 158->159 159->157 162 40103d-401059 call 403595 * 2 159->162 167 40140e-401417 call 4035c3 * 2 162->167 168 40105f-401061 162->168 167->157 168->167 169 401067-40116d call 40368d FindFirstFileW 168->169 175 401173-401192 call 4036c8 * 2 169->175 176 4013df-40140b call 403603 * 3 169->176 186 4013c4 175->186 187 401198-4011b7 call 40368d 175->187 176->167 188 4013c7-4013d9 FindNextFileW 186->188 192 4017f6-4017fd 187->192 193 4011bd-4011cf call 4037b8 187->193 188->175 188->176 192->186 195 401803-401821 call 4036c8 call 403bed 192->195 193->192 198 4011d5-4011e7 call 4037b8 193->198 205 401823-401870 call 403595 call 40368d call 403f43 195->205 206 401878-40187d 195->206 198->192 204 4011ed-40120f call 4036c8 call 403bed 198->204 224 401215-40121b 204->224 225 4017ab-4017d6 call 404145 204->225 205->206 208 401883-401888 206->208 209 401a28-401a5f call 40368d call 403f43 206->209 208->209 214 40188e-401893 208->214 226 401a64-401a67 209->226 214->209 218 401899-40189e 214->218 218->209 222 4018a4-4018a9 218->222 222->209 227 4018af-4018b4 222->227 224->225 230 401221-401227 224->230 235 4017dc-4017e7 call 4037b8 225->235 236 4013bd-4013bf call 4035c3 225->236 226->188 227->209 231 4018ba-4018bf 227->231 230->225 233 40122d-401233 230->233 231->209 234 4018c5-4018ca 231->234 233->225 237 401239-40123f 233->237 234->209 238 4018d0-4018d5 234->238 235->236 248 4017ed-4017ef 235->248 236->186 237->225 241 401245-40124b 237->241 238->209 242 4018db-4018e0 238->242 241->225 245 401251-401257 241->245 242->209 243 4018e6-4018eb 242->243 243->186 247 4018f1-401905 call 4044f7 243->247 245->225 246 40125d-401263 245->246 246->225 249 401269-40126f 246->249 254 401538-401542 call 4035c3 247->254 255 40190b-401910 247->255 248->192 249->225 251 401275-40127b 249->251 251->225 253 401281-401287 251->253 253->225 256 40128d-401293 253->256 254->186 255->254 257 401916-40192e call 40377e 255->257 256->225 259 401299-40129f 256->259 257->254 265 401934-40194c call 40377e 257->265 259->225 262 4012a5-4012ab 259->262 262->225 264 4012b1-4012b7 262->264 264->225 266 4012bd-4012c3 264->266 265->254 271 401952-401968 call 403729 265->271 266->225 268 4012c9-4012cf 266->268 268->225 270 4012d5-4012db 268->270 270->225 272 4012e1-4012e7 270->272 271->254 277 40196e-40197a call 4036b2 271->277 272->225 274 4012ed-4012f3 272->274 274->225 276 4012f9-4012ff 274->276 276->225 278 401305-40130b 276->278 283 401980-401993 call 401aef 277->283 284 401531-401533 call 4035c3 277->284 278->225 281 401311-401317 278->281 281->225 282 40131d-401323 281->282 282->225 285 401329-40132f 282->285 283->284 291 401999-40199e 283->291 284->254 285->225 288 401335-40133b 285->288 288->225 290 401341-401347 288->290 292 401423-401429 290->292 293 40134d-401382 call 404145 290->293 291->284 294 4019a4-4019b6 call 401d21 291->294 297 401719-40174e call 404145 292->297 298 40142f-401435 292->298 293->236 304 401384-40138f call 4037b8 293->304 305 4019b8-401a01 call 401c32 call 40368d call 403e03 294->305 306 401a1b-401a23 call 4035c3 294->306 297->254 313 401754-40175f call 4037b8 297->313 298->297 302 40143b-401441 298->302 302->297 303 401447-40144d 302->303 308 401453-401459 303->308 309 4016ef-401714 EnterCriticalSection call 404eb2 LeaveCriticalSection 303->309 304->236 323 401391-4013ba call 403f87 304->323 343 401a06-401a18 call 4035c3 * 2 305->343 306->284 308->309 314 40145f-401465 308->314 309->186 313->254 331 401765-4017a6 call 403f87 313->331 320 401467-401498 call 403f87 314->320 321 40149d-4014a3 314->321 320->186 327 401547-40154d 321->327 328 4014a9-4014cb call 404145 321->328 323->236 334 4015be-4015c4 327->334 335 40154f-401571 call 404145 327->335 328->254 346 4014cd-4014d8 call 4037b8 328->346 331->254 339 401603-401609 334->339 340 4015c6-4015e8 call 404145 334->340 335->236 354 401577-401582 call 4037b8 335->354 348 4016e8 339->348 349 40160f-401615 339->349 340->236 357 4015ee-4015f9 call 4037b8 340->357 343->306 346->254 366 4014da-40152b call 403595 call 40368d call 403f43 346->366 348->309 349->348 355 40161b-401621 349->355 354->236 368 401588 354->368 360 401623-40162a 355->360 361 401636-40163c 355->361 357->236 376 4015ff-401601 357->376 360->361 363 401670-401698 call 404145 361->363 364 40163e-401644 361->364 363->236 381 40169e-4016a9 call 4037b8 363->381 364->363 369 401646-40164c 364->369 366->284 373 40158a-4015b9 call 403f87 368->373 369->363 374 40164e-401654 369->374 373->236 374->363 380 401656-40165c 374->380 376->373 380->363 384 40165e-401665 call 401000 380->384 381->236 391 4016af-4016e3 call 403f87 381->391 390 40166a-40166b 384->390 390->186 391->236
                        APIs
                        • FindNextFileW.KERNELBASE(?,?), ref: 004013D1
                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00FAAB60,00401035,00FAAB60,?), ref: 00404109
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • FindFirstFileW.KERNELBASE(00000000,?,00FAAB60,?), ref: 00401161
                          • Part of subcall function 00403F87: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00403FE8
                          • Part of subcall function 00403F87: FindNextFileW.KERNEL32(0040179D,?), ref: 00404089
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 004016F5
                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 0040170E
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                        • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$7a?=$Discord/$Telegram
                        • API String ID: 1893179121-60960798
                        • Opcode ID: cc32662204eef177c1bb24944cceb37b970cd3f52aad9942ed642ea1a6b4ea2d
                        • Instruction ID: e0fe4e299a14adff3431ec18ef39797f5155a140b4338a3cd7c1f3b0b96d06eb
                        • Opcode Fuzzy Hash: cc32662204eef177c1bb24944cceb37b970cd3f52aad9942ed642ea1a6b4ea2d
                        • Instruction Fuzzy Hash: A0323A71E102146ADB249BA58C91BFE73B89F80304F14417FE845B72E1EB7C8E858B9D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 468 4020e1-402132 call 403595 471 402190-4021a2 GetCurrentHwProfileA 468->471 472 402134-402153 468->472 473 4021a4-4021b7 call 403668 471->473 474 4021ba-40222b GetSystemInfo call 403668 call 4035c3 GlobalMemoryStatusEx call 403668 471->474 475 402155-402159 472->475 476 40215b-402161 472->476 473->474 492 402268-402279 EnumDisplayDevicesA 474->492 479 40217b-402186 call 4035d8 475->479 480 402163-40216a 476->480 481 40216c-402172 476->481 486 402189-40218e 479->486 480->479 485 402174-402178 481->485 481->486 485->479 486->471 486->472 493 40227b-402281 492->493 494 40222d-402236 492->494 495 402257-402267 494->495 496 402238-402254 call 403668 494->496 495->492 496->495
                        APIs
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • GetCurrentHwProfileA.ADVAPI32(?), ref: 00402198
                        • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 004021BF
                        • GlobalMemoryStatusEx.KERNELBASE(?), ref: 004021F3
                        • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 00402275
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                        • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                        • API String ID: 330852582-565344305
                        • Opcode ID: 1289e8cf0d5fbe5f3f0ef4059f282c48e11b380c65581eb552a4a88b93ed5c2e
                        • Instruction ID: 22e8c097fdb53a750db3d38699cd98a3431052edcfded2005e7f0d2a9ec9707d
                        • Opcode Fuzzy Hash: 1289e8cf0d5fbe5f3f0ef4059f282c48e11b380c65581eb552a4a88b93ed5c2e
                        • Instruction Fuzzy Hash: 6141A6719083019BD720DF24CD85FABBBE8EB84714F10493EF945AB2C1E774994587AA

                        Control-flow Graph

                        APIs
                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,004084D4,?), ref: 00404F58
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00405014
                          • Part of subcall function 00404EB2: LeaveCriticalSection.KERNEL32(004084D4), ref: 00405031
                        • FindNextFileW.KERNELBASE(?,?), ref: 00405200
                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00FAAB60,00401035,00FAAB60,?), ref: 00404109
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                        • String ID: %s\%s$%s\*$Telegram
                        • API String ID: 648860119-4994844
                        • Opcode ID: d84d8187fe1ade631e357449a07b88c685cf14ca7df123eb18c2c8c5d20aa8b4
                        • Instruction ID: ecd5ca78d3e23e3f5ec3a68d4d3fe809ace172ce08446f2cd26366b6c0f1c70a
                        • Opcode Fuzzy Hash: d84d8187fe1ade631e357449a07b88c685cf14ca7df123eb18c2c8c5d20aa8b4
                        • Instruction Fuzzy Hash: D9A18021E14308A9EF10DBA0AD06BBE7775EF44710F20546FE904BB2E1EBB50E85875E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 649 401dc9-401ddb 650 401de1-401deb 649->650 651 401fb2-401fb7 649->651 650->651 652 401df1-401e1b call 40368d FindFirstFileW 650->652 652->651 655 401e21-401e65 call 403595 call 4036c8 652->655 660 401e6a-401e8f call 4036c8 * 2 655->660 665 401e95-401eae call 40368d 660->665 666 401f8e-401f9c FindNextFileW 660->666 672 401eb0-401ec0 call 4037b8 665->672 673 401ee1-401ee6 665->673 668 401fa9-401fad call 4035c3 666->668 669 401f9e-401fa4 666->669 668->651 669->660 672->673 679 401ec2-401ed2 call 4037b8 672->679 674 401eec-401ef6 673->674 675 401f7f-401f8a 673->675 674->675 678 401efc-401f09 call 404118 674->678 675->666 684 401f78-401f7a call 4035c3 678->684 685 401f0b-401f22 call 4036c8 call 403bed 678->685 679->673 686 401ed4-401ed7 call 401dc9 679->686 684->675 694 401f24-401f29 685->694 695 401f39-401f69 call 40368d call 403f43 685->695 691 401edc 686->691 691->675 694->695 696 401f2b-401f30 694->696 701 401f6e-401f71 695->701 696->695 698 401f32-401f37 696->698 698->684 698->695 701->684
                        APIs
                        • FindFirstFileW.KERNELBASE(?), ref: 00401E10
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • FindNextFileW.KERNELBASE(00000000,?), ref: 00401F94
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                        • String ID: %s%s$%s\%s$%s\*
                        • API String ID: 3555643018-2064654797
                        • Opcode ID: 5cebb7284f378f55fcd4df65f13594aa010d6026b77e4466925d64efd1a65d52
                        • Instruction ID: 14e95c991f87aca2b944788a29030c3de2d12e3058c1dcaec3f91741412fe5a3
                        • Opcode Fuzzy Hash: 5cebb7284f378f55fcd4df65f13594aa010d6026b77e4466925d64efd1a65d52
                        • Instruction Fuzzy Hash: C641B0706182025BC714EF24D955A2F77E8AF84704F10493FF885A72F2EB39EA44879E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 702 401d21-401d5c call 40475f 705 401dbc-401dc8 702->705 706 401d5e-401d85 call 403603 CryptUnprotectData 702->706 709 401d92-401d97 706->709 710 401d87-401d90 706->710 709->705 711 401d99-401db6 CryptProtectData 709->711 710->705 711->705
                        APIs
                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00401D80
                        • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 00401DB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                        • String ID: CRYPT32.dll$Poverty is the parent of crime.
                        • API String ID: 3642467563-1885057629
                        • Opcode ID: 0bfa8139f65bd25693e68981f44dce0d28659087e85b2fcfac568366f43bb735
                        • Instruction ID: c7f84ecd61725d2c0d2cc539ea739b2fab333b7ee9f2c38f0174a54d3eab5c97
                        • Opcode Fuzzy Hash: 0bfa8139f65bd25693e68981f44dce0d28659087e85b2fcfac568366f43bb735
                        • Instruction Fuzzy Hash: 9911F7B5D0020DABDB10DF95C8819EFBBBCEF48314F10456AE945B3280E774AE09CAA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 736 4035c3-4035c5 737 4035d7 736->737 738 4035c7-4035d1 GetProcessHeap RtlFreeHeap 736->738 738->737
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                        • RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$FreeProcess
                        • String ID:
                        • API String ID: 3859560861-0
                        • Opcode ID: a5c4a5c9563baa38c9ba5d526c864f3f6d83196204a18c55b87fe91dca070a4b
                        • Instruction ID: 873122bf131184cd6aa06baef865d0714c6afb91f4c12db888e56dda872d8f6a
                        • Opcode Fuzzy Hash: a5c4a5c9563baa38c9ba5d526c864f3f6d83196204a18c55b87fe91dca070a4b
                        • Instruction Fuzzy Hash: B6B092B0A491006AEE182BA09E0DB3B3A18AB04303F0002A8B302B14A0CA786500862A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 402282-40229f InitializeCriticalSectionAndSpinCount 1 4022a1 0->1 2 4022a6-4022bc CreateMutexA 0->2 3 40270d 1->3 4 4022c2-4022cd GetLastError 2->4 5 402705-402707 ExitProcess 2->5 4->5 6 4022d3-4022e2 call 403c5f 4->6 9 4022e8-402312 call 403603 call 404871 6->9 10 4026dc-4026fc DeleteCriticalSection 6->10 15 4026d4-4026d7 call 4035c3 9->15 16 402318-40235d call 403668 call 4048d6 9->16 10->5 15->10 16->15 22 402363-402397 call 403595 * 3 16->22 29 40266c-4026bb call 403e03 call 4035c3 * 4 call 403c88 22->29 30 40239d-4023a4 22->30 60 4026be-4026c4 call 4053f8 29->60 30->29 31 4023aa-4023b1 30->31 31->29 33 4023b7-4023f3 call 40475f 31->33 33->29 39 4023f9-40240e call 401fba 33->39 45 402410-402447 call 40475f 39->45 46 40244e-402468 39->46 45->46 54 402449 45->54 55 402472-40249d call 4036c8 46->55 56 40246a-40246c ExitProcess 46->56 54->3 64 4024a7-4024d2 call 4036c8 55->64 65 40249f-4024a1 ExitProcess 55->65 63 4026c9-4026d0 60->63 63->15 66 4026d2 63->66 70 4024d4-4024d6 ExitProcess 64->70 71 4024dc-40254a call 4036c8 call 404c2d CreateThread * 2 WaitForMultipleObjects call 401a6c call 4020e1 64->71 66->60 80 402554-40255b 71->80 81 40255d-402566 80->81 82 40258e-4025aa ObtainUserAgentString 80->82 83 402568-402582 81->83 84 40258c 81->84 85 4025c2-40262d call 4052c4 * 6 call 403595 82->85 86 4025ac-4025bf call 403668 82->86 83->84 84->80 104 40263f-402667 call 4036c8 call 4052c4 * 2 call 4035c3 85->104 105 40262f-402639 GetModuleFileNameW 85->105 86->85 104->29 105->104
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(004084D4,00000DA3), ref: 00402297
                        • CreateMutexA.KERNELBASE(00000000,00000000,0060cbb5-1dbd-468c-b2ba-03be756aa1c1), ref: 004022AF
                        • GetLastError.KERNEL32 ref: 004022C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                        • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$0060cbb5-1dbd-468c-b2ba-03be756aa1c1$@$cb_phoenix.v1.0$kernel32$shell32
                        • API String ID: 2005177960-3252262841
                        • Opcode ID: 7d85174eba821bd26a3f3c474d69b94223cfdb22e9e683f010e87f1aa16b2777
                        • Instruction ID: db5b455704c763b654c06a6b3c78ab43ebdd973590fbbde67410529c29875780
                        • Opcode Fuzzy Hash: 7d85174eba821bd26a3f3c474d69b94223cfdb22e9e683f010e87f1aa16b2777
                        • Instruction Fuzzy Hash: 36C11630904245AEEB10EFA0DE4ABAE7F75AF14705F00447EE141BA2E2DFB91A44CB5D

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00FAAB60,00401035,00FAAB60,?), ref: 00404109
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00404580
                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 004045CC
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 0040464F
                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 00404688
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 004046C5
                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 00404708
                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00404721
                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 0040474A
                          • Part of subcall function 00404377: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,?,00000000,?,?,?,?,?,004045FF), ref: 00404390
                          • Part of subcall function 00404377: GetProcAddress.KERNEL32(00000000), ref: 00404399
                          • Part of subcall function 00404377: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,004045FF), ref: 004043AA
                          • Part of subcall function 00404377: GetProcAddress.KERNEL32(00000000), ref: 004043AD
                          • Part of subcall function 00404377: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,004045FF), ref: 0040442F
                          • Part of subcall function 00404377: GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000002,?,?,?,?,004045FF), ref: 0040444B
                          • Part of subcall function 00404377: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 0040445A
                          • Part of subcall function 00404377: CloseHandle.KERNEL32(004045FF,?,?,?,?,004045FF), ref: 0040448A
                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                        • String ID: @$\??\%s$\Network\Cookies
                        • API String ID: 330363434-2791195959
                        • Opcode ID: 3aceadb322b04b0cd88ffec1cbc000090e3a08d248677b6e52905a850177b162
                        • Instruction ID: 30b89a0c7dd792c6c55c89bb752360b8731b4be3a9f183659006c232308b4c97
                        • Opcode Fuzzy Hash: 3aceadb322b04b0cd88ffec1cbc000090e3a08d248677b6e52905a850177b162
                        • Instruction Fuzzy Hash: 0C719F70940209BFDB04DF90CD4ABAD7BB5FB44305F10803AFA41BA2E1EBB95A45CB59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 442 4053f8-405481 call 40475f 445 405483-405485 442->445 446 40548a-4054e6 442->446 447 4055cd-4055d0 445->447 449 4055ca 446->449 450 4054ec-40551a call 4053ec socket 446->450 449->447 453 4055c0-4055c3 450->453 454 405520-405537 call 40535a call 403603 450->454 453->449 459 405538-40553e 454->459 460 405540-405555 connect 459->460 461 4055b3-4055bc closesocket 459->461 462 4055a6-4055b1 Sleep 460->462 463 405557-405577 send 460->463 461->453 462->459 463->462 464 405579-405593 send 463->464 464->462 465 405595-4055a4 call 4035c3 464->465 465->461
                        APIs
                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                        • socket.WS2_32(?,00000001,00000000), ref: 0040550F
                        • connect.WS2_32(000000FF,?,00000010), ref: 0040554E
                        • send.WS2_32(000000FF,00000000,00000000), ref: 00405570
                        • send.WS2_32(000000FF,000000FF,106,00000000), ref: 0040558C
                        • closesocket.WS2_32(000000FF), ref: 004055BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: send$HandleLibraryLoadModuleclosesocketconnectsocket
                        • String ID: 106$185.244.212.106$ws2_32.dll
                        • API String ID: 2279181061-2093737415
                        • Opcode ID: 1717f7b469886dd0248fd88ee7bed06fc9c62e98bc7b207c854f528114d91968
                        • Instruction ID: 1ba8255f1e8dd8081fefad2875cd7e7399d758cce23e8b083b3bca88080a13bc
                        • Opcode Fuzzy Hash: 1717f7b469886dd0248fd88ee7bed06fc9c62e98bc7b207c854f528114d91968
                        • Instruction Fuzzy Hash: C851C530C44288EDEF018BE4D8097EEBFB99F15314F14459AE660BE2D1C7B9474ACB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 564 4048d6-4048e5 565 404c1b 564->565 566 4048eb-404904 VirtualAlloc 564->566 567 404c21-404c24 565->567 566->565 568 40490a-40492e call 40475f 566->568 569 404c27-404c2c 567->569 572 404934-404949 call 4035d8 568->572 573 404c17-404c19 568->573 576 40494b-404952 572->576 573->569 577 404954-404959 576->577 578 40495d-404960 576->578 577->576 579 40495b 577->579 580 404964-40498b GetCurrentProcess IsWow64Process call 4052c4 578->580 579->580 583 404991-404996 580->583 584 404a1b-404a1e 580->584 587 4049b7-4049bc 583->587 588 404998-4049a8 583->588 585 404a20-404a23 584->585 586 404a6b-404a6e 584->586 589 404a43-404a47 585->589 590 404a25-404a41 585->590 592 404a74-404a79 586->592 593 404b19-404b1f 586->593 594 4049fc-4049ff 587->594 595 4049be-4049c3 587->595 591 4049aa-4049b2 588->591 589->565 601 404a4d-404a69 589->601 600 404abd-404aca 590->600 591->600 602 404a9b-404a9d 592->602 603 404a7b-404a99 592->603 598 404b25-404b2b 593->598 599 404bba-404bbd 593->599 596 404a01-404a04 594->596 597 404a0a-404a19 594->597 595->588 604 4049c5-4049c7 595->604 596->565 596->597 597->591 605 404b4b-404b51 598->605 606 404b2d-404b46 598->606 599->565 607 404bbf-404be0 599->607 600->567 601->600 608 404acf-404ad2 602->608 609 404a9f-404ab8 602->609 603->600 604->588 610 4049c9-4049cc 604->610 611 404b71-404b77 605->611 612 404b53-404b6c 605->612 606->567 613 404c02 607->613 614 404be2-404be8 607->614 617 404af2-404af5 608->617 618 404ad4-404aed 608->618 609->600 615 4049e2-4049e5 610->615 616 4049ce-4049e0 610->616 621 404b97-404b9d 611->621 622 404b79-404b92 611->622 612->567 620 404c07-404c0e 613->620 614->613 623 404bea-404bf0 614->623 615->565 624 4049eb-4049fa 615->624 616->591 617->565 619 404afb-404b14 617->619 618->567 619->567 620->567 621->607 625 404b9f-404bb8 621->625 622->567 623->613 626 404bf2-404bf8 623->626 624->591 625->567 626->613 627 404bfa-404c00 626->627 627->613 628 404c10-404c15 627->628 628->620
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,00402351), ref: 004048F7
                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                        • GetCurrentProcess.KERNEL32(Q#@), ref: 0040496B
                        • IsWow64Process.KERNEL32(00000000), ref: 00404972
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                        • String ID: Q#@$l$ntdl$ntdllQ#@
                        • API String ID: 1207166019-1218684799
                        • Opcode ID: bcc7277f0982174f50dd03a4f8c9cdb8aac042102541d2e3cf7aa096f817556f
                        • Instruction ID: 3ee230e69bd7094b3339c115938649c60d03c5872765df0b6732839f5e82a11c
                        • Opcode Fuzzy Hash: bcc7277f0982174f50dd03a4f8c9cdb8aac042102541d2e3cf7aa096f817556f
                        • Instruction Fuzzy Hash: C881E5B061820196EB649B50EF5577A33A8FB91710F20053FE345BB3E1EBB88D80874E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 629 401fba-40202b GetUserDefaultUILanguage 630 402035-40203c 629->630 631 402054-40208c call 403668 * 2 GetKeyboardLayoutList 630->631 632 40203e-40204d 630->632 640 40208e-402092 631->640 641 4020cf-4020e0 call 403668 631->641 633 402052 632->633 634 40204f 632->634 633->630 634->633 643 40209c-4020a3 640->643 643->641 645 4020a5-4020cd call 403668 643->645 645->643
                        APIs
                        • GetUserDefaultUILanguage.KERNELBASE ref: 0040201D
                        • GetKeyboardLayoutList.USER32(00000032,?), ref: 0040207F
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: DefaultKeyboardLanguageLayoutListUser
                        • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                        • API String ID: 167087913-619012376
                        • Opcode ID: 098336f7847c56de198dceea2ad9df411a430e70487c194ec4b5a45776de32d6
                        • Instruction ID: 10b5000f3d20341b48b4ae383d5168f65d0d8f996377bdde78befb18ad8f4928
                        • Opcode Fuzzy Hash: 098336f7847c56de198dceea2ad9df411a430e70487c194ec4b5a45776de32d6
                        • Instruction Fuzzy Hash: 0931BE60D08298A9DB009FE494067BDBB70EF14306F1054ABF648F72C2D27E4B49D76E

                        Control-flow Graph

                        APIs
                        • EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                        • GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                        • LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                        • String ID:
                        • API String ID: 1367039788-0
                        • Opcode ID: d8cb59fa451f531bb7d9703be9d6d3f1f0789b70689b423d9663a2cdfd0a23a5
                        • Instruction ID: 3223c967265719e8531dc247f72f9ba3551b462deb81e419d276c47ad9b9309f
                        • Opcode Fuzzy Hash: d8cb59fa451f531bb7d9703be9d6d3f1f0789b70689b423d9663a2cdfd0a23a5
                        • Instruction Fuzzy Hash: 81D0A733E0812067CB5027F9BE0C99BBF6CEF86661705027AF645E3160CAB85C0587AA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 713 40475f-40477b GetModuleHandleA 714 404791-404799 713->714 715 40477d-404788 LoadLibraryA 713->715 717 404868 714->717 718 40479f-4047aa 714->718 715->714 716 40478a-40478c 715->716 719 40486b-404870 716->719 717->719 718->717 720 4047b0-4047b9 718->720 720->717 721 4047bf-4047c4 720->721 721->717 722 4047ca-4047ce 721->722 722->717 723 4047d4-4047f9 722->723 724 404867 723->724 725 4047fb-404806 723->725 724->717 726 404808-404812 725->726 727 404814-40482e call 4036b2 call 403bed 726->727 728 404857-404865 726->728 733 404830-404838 727->733 734 40483c-404854 727->734 728->724 728->725 733->726 735 40483a 733->735 734->728 735->728
                        APIs
                        • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                        • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: HandleLibraryLoadModule
                        • String ID: ntdl
                        • API String ID: 4133054770-3973061744
                        • Opcode ID: 153b30b252ebdc061fc8619bae493407424138c2e36891cb89667ed67eb505d5
                        • Instruction ID: 11ff4d8a77b90bf3d421a1100ca7fc1e5220f65cc3b3dee9f6ee43e9c25cea99
                        • Opcode Fuzzy Hash: 153b30b252ebdc061fc8619bae493407424138c2e36891cb89667ed67eb505d5
                        • Instruction Fuzzy Hash: B131127AE00215DBCB54EFA9C480ABEB7B0FF89704F04466AC551B3381C738A951CBA4
                        APIs
                        • GetFileAttributesW.KERNELBASE(00FAAB60,00401035,00FAAB60,?), ref: 00404109
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: d097877ed9740e91f650fee32fe24c2afa502c42455f07a4a2dfcf8c61e2aed8
                        • Instruction ID: c139d24a98a97a360684cfbb393a546f3f92256ca7c1166e296c0db0bb017a51
                        • Opcode Fuzzy Hash: d097877ed9740e91f650fee32fe24c2afa502c42455f07a4a2dfcf8c61e2aed8
                        • Instruction Fuzzy Hash: 1DA022380302008BCA2C03300FAA00E30000E0A2F03220BACB033F80E0EA38C2800002
                        APIs
                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00FAAB60,00401035,00FAAB60,?), ref: 00404109
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00403FE8
                        • FindNextFileW.KERNEL32(0040179D,?), ref: 00404089
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                        • String ID: %s%s$%s\%s$%s\*
                        • API String ID: 674214967-2064654797
                        • Opcode ID: 851fe2d0db6313b3b97ce49e1a9b884d2538fd0dfee7c13a5dcc67b2ec672ff6
                        • Instruction ID: 3b86eeb09e9c0eadff58ad7c69213eb5ca1285151f1c464e5ebf84cdc8497cf1
                        • Opcode Fuzzy Hash: 851fe2d0db6313b3b97ce49e1a9b884d2538fd0dfee7c13a5dcc67b2ec672ff6
                        • Instruction Fuzzy Hash: 2831F3B1E0021967DB21AF618C45ABE7BA99F80304F0441BEFE05B73D1EB3D8F458699
                        APIs
                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 00404198
                        • FindNextFileW.KERNEL32(000000FF,?), ref: 004041E4
                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileFindHeap$FirstFreeNextProcess
                        • String ID: %s\%s$%s\*
                        • API String ID: 1689202581-2848263008
                        • Opcode ID: 03ec7cdd6b1c53106126d1c61fe10d4903e8003fb5869c5929cfc5ffc06257b0
                        • Instruction ID: 0ae009433c7d8e74f2399d383574e25c26017cf842a18982b61cce91de727895
                        • Opcode Fuzzy Hash: 03ec7cdd6b1c53106126d1c61fe10d4903e8003fb5869c5929cfc5ffc06257b0
                        • Instruction Fuzzy Hash: C931A8B0B00214ABCB20AF65CC8566E7BADEF85745F1044BEB905A73C1DB7C9E418B99
                        APIs
                        • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,?,00000000,?,?,?,?,?,004045FF), ref: 00404390
                        • GetProcAddress.KERNEL32(00000000), ref: 00404399
                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,004045FF), ref: 004043AA
                        • GetProcAddress.KERNEL32(00000000), ref: 004043AD
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,004045FF), ref: 0040442F
                        • GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000002,?,?,?,?,004045FF), ref: 0040444B
                        • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 0040445A
                        • CloseHandle.KERNEL32(004045FF,?,?,?,?,004045FF), ref: 0040448A
                        • GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000001,?,?,?,?,004045FF), ref: 00404498
                        • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 004044A7
                        • CloseHandle.KERNEL32(?,?,?,?,?,004045FF), ref: 004044BA
                        • CloseHandle.KERNEL32(000000FF), ref: 004044DD
                        • CloseHandle.KERNEL32(?), ref: 004044E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                        • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                        • API String ID: 3110323036-2044536123
                        • Opcode ID: b5df68a6bf919bf50a48ac763dfae3735d449fe75d6ecaf60c1b57aeb643f3aa
                        • Instruction ID: 6b6220df04feaa08bf7b4da56c654ad1a859742ad58229fcdab27ba0eb323707
                        • Opcode Fuzzy Hash: b5df68a6bf919bf50a48ac763dfae3735d449fe75d6ecaf60c1b57aeb643f3aa
                        • Instruction Fuzzy Hash: 884172B1E00119ABDB109BE68D44AAFBBB9EF84314F144176F604F22D0DB78DE41CBA5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldvrm
                        • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                        • API String ID: 1302938615-1267642376
                        • Opcode ID: 74a9ea239097ada3d1414e157643d0f430ec2b0ca7e571adabed524bf4d5b292
                        • Instruction ID: bcdd270a88cad76f636a2a04ffa2895c1f0e3bc7806eb067e009ec13a134c41f
                        • Opcode Fuzzy Hash: 74a9ea239097ada3d1414e157643d0f430ec2b0ca7e571adabed524bf4d5b292
                        • Instruction Fuzzy Hash: 5691A0706087028FDB25CF24C58862BB7E5EF85344F24897FE49AA77D1D7B4A881CB49
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: x
                        • API String ID: 0-2363233923
                        • Opcode ID: cc77272222d09f9b3e8e7dc35d4396ed1e50a5a1df7a949ef9c02a18000c61cf
                        • Instruction ID: cdbb1d4b41a264391f31279463ee9e8db51f7a06bf36a1bae859705254ac4300
                        • Opcode Fuzzy Hash: cc77272222d09f9b3e8e7dc35d4396ed1e50a5a1df7a949ef9c02a18000c61cf
                        • Instruction Fuzzy Hash: 1302A174D00219EFCB45CF98C985AAEBBF4FB09305F10846AE826EB390D734AA41CF55
                        APIs
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 00402ECA
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                        • String ID: 6#@
                        • API String ID: 1990697408-399668929
                        • Opcode ID: 1f26a5c5fc2634c2030f9b83c1c8166a34ad48809439acca6c6bd24674cc38fe
                        • Instruction ID: 04ec494e2720618fda0ea9b48e18905337fba48f3a471985427a56106dfb7a8a
                        • Opcode Fuzzy Hash: 1f26a5c5fc2634c2030f9b83c1c8166a34ad48809439acca6c6bd24674cc38fe
                        • Instruction Fuzzy Hash: 9202AF70A04249EFCB41CF98C985AAEBBF4BF09305F148466E855FB390D778AA41CF55
                        APIs
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,$d.log,000000FF,00000000,00000000,00000000,00000000,?,?,?,00403E4E,00000000,?,0000011C), ref: 00403DC1
                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,$d.log,000000FF,00000000,?,00000000,00000000,?,00403E4E,00000000,?,0000011C), ref: 00403DF7
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.1351063504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_400000_CasPol.jbxd
                        Yara matches
                        Similarity
                        • API ID: ByteCharCriticalHeapMultiSectionWide$AllocateEnterLeaveProcess
                        • String ID: $d.log
                        • API String ID: 635875880-1910398676
                        • Opcode ID: 596067efd1d70e71452a917ac77f7634f6861e6932447c6e6420039467924f9e
                        • Instruction ID: ac6dd0e6687c57a2322cdc8011629eff706fdab16a0174ef90b3a49cae1c3f8c
                        • Opcode Fuzzy Hash: 596067efd1d70e71452a917ac77f7634f6861e6932447c6e6420039467924f9e
                        • Instruction Fuzzy Hash: 46F0BEB16001207FA3246A6ACC09C777EAEDBC2B71304433ABC18EB3D0D9309C0082B0